IndieWeb post types

This content type is full of IndieWeb post types, which are all content types which allow me to take greater ownership of my own data. These are likely unrelated to my blog posts. You can find a better breakdown by actual post kind below:

 Bookmark

Readability of code is a very important, but so is using idiomatic language style. However the difficulty, as this article calls out, is that some folks won't find it easy to read or write code in an 'idiomatic' way. And also, who cares if you convert the readable four-line code snippet into a horrible to read one-liner? All it does is make it harder for the next person!

 Bookmark

This is another good article talking about the difficulties of working on the Web, with the plethora of technologies 'required' to get even a static website off the ground, let along big business applications. It's something we're all just accepting as a thing that happens (or folks from other tech stacks are ridiculing) but no one is really looking at what we can do to prevent it or make it better.

 Listen

Listened to Impostor Syndrome — Ladybug Podcast
Post details
Have you ever been scared to contribute to a conversation or publish a blog post because you were worried you weren’t qualified enough? Wondered how you got to the point you’re at in your career because you feel you don’t belong? Or that you’re a fraud? You’re not alone! In this episode, we discuss

 Listen

Listened to New Career Who Dis — Ladybug Podcast
Post details
There are several different ways you can learn how to code. In this episode, we discuss computer science degrees, bootcamps, and self-directed learning. Each has benefits and have brought a lot of people into the world of programming. Each also has challenges. We all have had unique paths to program

 Listen

Listened to Just Visiting – Darknet Diaries
Post details
Join JekHyde and Carl on a physical penetration test, a social engineering engagagement, a red team assessment. Their mission is to get into a building they shouldn't be allowed, then plant a rogue computer they can use to hack into the network from a safe place far away.