A Developer’s TaleWe have entered the final stage of my coding program. Writing cover letters and technical narratives has me reflecting upon my journey…Nov 17, 2020Nov 17, 2020
Grimes is right.We should be conscientious of what we are teaching those machine-learning robots, like the “hot robot”, Sophia, who famously asked by her…Nov 9, 2020Nov 9, 2020
Tales from the bryptjs library: Cryptography and Securing PasswordsIn sixth grade, I created a cipher for the alphabet and convinced my closest friends to memorize it so we could pass each other notes…Nov 1, 2020Nov 1, 2020
Update: Foreign influence on the 2020 Presidential Election.Last month I wrote about the influence Russian hacking organizations, namely Fancy Bear, had on the 2016 Presidential election. As of…Oct 26, 2020Oct 26, 2020
Google Cloud SQL: Setting up an instance and proxy.In this article, we are going to create an instance of a MySQL database on Google’s Cloud Platform and connect our local computer to it…Oct 19, 2020Oct 19, 2020
Brief recap of the role SQL injections played in 2016 presidential electionA group Microsoft calls Strontium (aka APT28 aka Fancy Bear), best known for targeting the Democratic campaign during the 2016…Sep 14, 2020Sep 14, 2020
APIs? I don’t know her: An abridged conceptual introduction.We had met a couple times working on backbone, React, and Angular projects. I knew she had connections to vital information and gave me…Sep 7, 2020Sep 7, 2020
Use protection: XSS Attacks & Prevention — Chatterbox SprintLet’s talk Cross-site scripting (XSS)Aug 31, 2020Aug 31, 2020
Determining the value of ‘this’Hey, I’m not a big fan of wordy Medium articles, so here is my abridged version of determining the context of ‘this’.Aug 24, 2020Aug 24, 2020