All Posts
Reactivity and Reactive Programming
Nearly all modern browser UI frameworks boast Reactivity as a core feature. What is Reactivity all about? Is it useful or applicable outside of frontend development? what is the hype all about anyways?
read articleThe Finite State Machine
The Finite State Machine is a model of computation that is important in the study of the theory of computation, and has various practical applications.
read articleMessaging in Distributed Systems (Pub-Sub, Message Queues, etc)
Exploring the messaging design pattern in distributed systems at a high level. What benefits could it provide to a distributed system, and what are the disadvantages and limitations?
read articleSecuring SSH With Passwordless Public Key Authentication
SSH public key authentication adds a ton of security, convenience, and scalability compared to traditional password authentication. Let's see how easy it is to setup, and whether you should use it or not.
read articleWhat is the Fediverse, and Frequently Asked Questions
The Fediverse is an interesting take on the world of social networks, but is surrounded by a degree of jargon and mystery. Let's answer some of the commonly asked questions about it!
read articleDemistifying Containers and Docker
What exactly is a container? what exactly is happening when I run my application in a (Docker) container? What is the benefit, and do I truly need this complexity in my project?
read articleUnix Permissions - Part 3: Devising a Security Model
Securing files or systems using learnings from the previous parts of this series about Unix Permissions and their CLI apps.
read articleUnix Permissions - Part 2: chmod and Other Permission Command-line Apps
Exploring various command-line tools for working with Unix Permissions, and taking a deep dive into two of the most important ones: chmod and chown
read articleUnix Permissions - Part 1: Anatomy of Permissions
Diving into the traditional Unix permission system, which is essential for working in the command line on Linux and Unix-like systems. We will explore how the permission system works and how its individual components tie together.
read articleCustomizing Find and Replace in the Command Line
Exploring how to perform find and replace in the command line and looking into many options to customize and improve it, including making it recursive and applying it to many files and directories, previewing changes, and adding a confirmation prompt, learning general command line concepts on the way.
read articleRSYNC as a Backup Server: Simple, Powerful and Flexible
Pitching RSYNC as a self-hosted backup solution (for photos, notes, etc.) and how to implement it. I will discuss its pros and cons and provide examples of its extensibility and flexibility
read article