The Concurrency Dilemma: Threads v. ProcessesExploration of multithreading versus multiprocessing use cases with code samples using Python’s concurrent.futures library.Sep 26Sep 26
Earning Big Bucks on Upwork: A Developer’s Strategy for SuccessAre you a web or software developer looking to make it on Upwork? Wondering why you seem to losing money by buying and wasting connects…Sep 24Sep 24
Connecting Prospective Students to Admission Counselors with SchoolDiggerImagine: you’re looking at attending a college, and you’re trying to get in contact with someone from the admission office, but there’s no…Sep 11Sep 11
Automating PR Descriptions with GitHub Actions and Python: Let the Bots Do the TalkingIf you’ve ever found yourself staring at a blank “Description” box on a GitHub Pull Request, hoping a well-formed PR summary will magically…Sep 10Sep 10
Reducing Cloud Costs: Deploying SSL-Enabled Web Apps to Single Instance EBS EnvironmentsThis article is for anyone aiming to minimize AWS EBS costs and looking for instructions on setting up a single instance EBS web server…Sep 5Sep 5
A Look at VQE: Ground States Help Us SimulateA deep dive into the Variational Quantum Eigensolver (VQE) algorithm for identifying quantum system ground states.Dec 10, 2022Dec 10, 2022
IaaS, SaaS, PaaS: Analyzing a Sassy QuarterbackThere are a multitude of articles, videos, infographics, and probably even poems out there on the internet walking through the differences…Oct 25, 2022Oct 25, 2022
A Security Showdown in the Clouds: Comparing Security Philosophies of GCP and AWSAs a long-time fan of Jimmy Neutron, I can’t help but to think about his Neutronic Storminator invention (from Season 2 Episode 14 — “Out…Oct 24, 2022Oct 24, 2022
Scrutinizing Single Sign On: Superior Security, but with StipulationsWhen facing the question of how to manage identity and access control for an entire organization composed of thousands (or even just…Oct 23, 2022Oct 23, 2022
The ARC Protocol — Keeping Emails Afloat on the Voyage Through Strict Security PoliciesThis article will first provide some context around the SPF, DKIM, and DMARC protocols for email security, and will establish the…Oct 4, 2022Oct 4, 2022