Building a Phone Routing System
·
In this walkthrough, I build a phone redirection system using Twilio to automatically forward frequent wrong numbers to the business with a support line 2 digits transposed from me.
·
In this walkthrough, I build a phone redirection system using Twilio to automatically forward frequent wrong numbers to the business with a support line 2 digits transposed from me.
·
I have a confession to make. I really like the new Gutenberg editor for WordPress. I know, I know. Developers aren't supposed to like massive, intrusive changes like this. As of the time of this writing, the plugin stands with 2.6 stars on the plugin repository – at least 133 of those ratings are 1-star
·
I attend a lot of tech conferences. I once attended at least 14 events over the course of twelve months. Large events at professional conference centers. Small events at local churches. Events that required driving. Events that required passing through customs. Every event is unique. Every organizing team is unique. Every attendee is unique. Still,
·
I have opinions. I will happily share them with you if asked. I will also continue to explain that they are my opinions first, most likely based on some objective fact.
·
I’m tired of lamenting the state of WordPress security and doing nothing to address it. I’m building solutions to turn the conversation around.
·
I have been incredibly privileged in my career. I fully recognize and respect this isn’t the case for everyone. It’s why I still write: to provide resources for those who have none. It’s why I publish FOSS code: to help get other devs started. I’m doing a small part. Paying WordCamp speakers for their contributions…
·
The impact of an improperly-secured Gearman server grows with the importance of the application using it.
·
My role in my job is not the limit to who I am.
·
A story I enjoy retelling is how a friend of mine tricked me into using WordPress. At the time, I was working with him on a career mentorship project. He’d written a book that I was publishing, and we wanted to add a premium video series to go along with it. We just needed a
·
It’s impossible to train consumers on appropriate security behavior when the real ways of interacting with a bank so closely resemble phishing attacks.