-
The Great Migration: Next Steps
With a new server set up, the next step in the great migration was to start moving services to it from the cloud. First up, my toy encrypted secret sharing service!
-
Tech Error: Diversity Not Found
If everyone around me looks like me, sounds like me, and generally thinks like me I am not learning or growing. Diversity is a critical requirement for growth, development, and sustainability in any field – but tech in particular!
-
The Great Migration: Configuring the Server
The first step in a server migration is configuring the new machine to which other systems, applications, and services will move. Learn how I chose my OS and configured it for remote access. This includes direct connectivity during reboots of a fully encrypted disk!
-
The Great WordPress Migration
In 2024 I finally migrated my WordPress blog (among other projects) from the cloud to a self-hosted Linux machine in my home office. All without exposing my private network to the world! Come join me on this journey as I explain my approach to owning my work and my own network.
-
Customer Focus: Acquisition vs Retention
Attempting to log into Hulu reveals a customer focus on sales, not on maintaining relationships with active, paying customers.
-
An Ode to Open Source
In 2023 I managed to leverage mesh VPN networking to link my machines and remotely manage open source. The future is beautiful!
-
Hiring and risk
Almost daily now I see posts on LinkedIn complaining about the length of corporate hiring and interview processes. If Elon Musk can buy Twitter in 10 days, you can hire a candidate in less than a month. Chris Abbass Sentiment like this is legion. I admit that, with many pipelines, processes can be burdensome, drawn-out, […]
-
PHP Strict Typing
Why use strict typing in a language that supports dynamic types? It’s all about managing the way PHP handles memory.
-
You are not your customer
When you start a company and come up with a name, whether or not you like the name doesn’t matter. You are not the customer.
-
Understanding access control
Every application that allows authentication requires a proven form of access control. It’s important to understand the different formats available.








