Published inBits and PiecesHTTPS: an awesome, secure tale (pt 1)Understanding the security protocol which powers the internet starts here!Jul 14, 2020A response icon2Jul 14, 2020A response icon2
my iterm2 setupI recently got a new computer. I’ve previously spent too much time on getting my terminal setup. This time I documented it for myself and…Jun 2, 2020Jun 2, 2020
Published inHackerNoon.comWeb Performance: Understanding the Critical Render Path (Part 1)The biggest turnoff when visiting a new web application can be slow load times!Jul 1, 2019A response icon2Jul 1, 2019A response icon2
Published inHackerNoon.comHow to Build a JWT Auth Service with GoJSON Web Tokens (JWT) are a popular approach to ensure secure authentication in modern applications. A JWT allows us to securely transmit…Jul 1, 2019Jul 1, 2019
Published inHackerNoon.comProgressive Web Apps (PWAs) FTW — Pt. 2IntroductionJan 14, 2019Jan 14, 2019
Published inHackerNoon.comPWAs FTW — Pt. 1IntroductionNov 26, 2018A response icon1Nov 26, 2018A response icon1
Published inHackerNoon.comHow to Not Destroy Millions in Smart Contracts (Pt.2)IntroductionOct 27, 2018Oct 27, 2018
Published inHackerNoon.comHow to Not Destroy Millions in Smart Contracts (Pt. 1)IntroductionAug 8, 2018A response icon3Aug 8, 2018A response icon3
Published inHackerNoon.comTime to Go! Learning Golang through ExamplesI’ve recently taken interest in the blockchain open source community. The first thing that I’ve noticed is that the majority of projects I…Jul 30, 2018Jul 30, 2018
Published inHackerNoon.comHow I Landed a Facebook Internship and Converted it to a Full Time OfferWith internship season in full swing I’ve reflected on last years internship memories and lessons. Interning at Facebook was a very…Jul 5, 2018A response icon2Jul 5, 2018A response icon2