IndieWeb post types

This content type is full of IndieWeb post types, which are all content types which allow me to take greater ownership of my own data. These are likely unrelated to my blog posts. You can find a better breakdown by actual post kind below:

 Listen

Listened to Building APIs, the Cloud Elements way – Scale Your Code Podcast – Podcast by Scale Your Code Podcast 
Post details
Learn how to build scalable APIs with features like performance analytics, from a company that focuses on building API integrations. Also learn about their development pipeline, culture, and communica... – Listen to Building APIs, the Cloud Elements way by Scale Your Code Podcast instantly on your tablet, phone or browser - no downloads needed.

 Listen

Listened to GitLab with Pablo Carranza
Post details
On January 31st 2017, GitLab experienced a major outage of their online repository hosting service. The primary database server experienced data loss due to a combination of malicious spam attacks and engineering mistakes that occurred while trying to respond to those spam attacks. GitLab responded to the event transparently. The company put up a postmortem

 Listen

Listened to Twine Radio 2 - PHP Minds - Twine Radio
Post details
Welcome to the second episode of Twine Radio. On this episode I discuss the use of social media with tech meetups;and the first interview with Adoni Pavlakis and Shaun Hare as I talk to them about PHP Minds. The next PHP Minds event is on Thursday August the 11th at 7:00pm at JH.As mentioned you can find out more by […]

 Listen

Listened to Episode One - Twine Radio
Post details
Welcome to the first episode of Twine Radio. On this episode I’ll talk more about Twine Radio and its goals;and the first interview with Jess White as I talk to her about the new Women In Tech Nottingham event that launched on the 6th April 2016. Women In Tech Notts next event is on Wednesday […]

 Listen

Listened to Container Security with Phil Estes
Post details
Containers have become the unit of infrastructure that many technology stacks deploy to. With the shift to containers, the attack surface of an application has changed, and we need to reconsider our security models; the resource allocation of our containers, the interactions between different containers on a single machine, and the big picture–how the external