Austin HuntThe Concurrency Dilemma: Threads v. ProcessesExploration of multithreading versus multiprocessing use cases with code samples using Python’s concurrent.futures library.Sep 26Sep 26
Austin HuntEarning Big Bucks on Upwork: A Developer’s Strategy for SuccessAre you a web or software developer looking to make it on Upwork? Wondering why you seem to losing money by buying and wasting connects…Sep 24Sep 24
Austin HuntConnecting Prospective Students to Admission Counselors with SchoolDiggerImagine: you’re looking at attending a college, and you’re trying to get in contact with someone from the admission office, but there’s no…Sep 11Sep 11
Austin HuntAutomating PR Descriptions with GitHub Actions and Python: Let the Bots Do the TalkingIf you’ve ever found yourself staring at a blank “Description” box on a GitHub Pull Request, hoping a well-formed PR summary will magically…Sep 10Sep 10
Austin HuntReducing Cloud Costs: Deploying SSL-Enabled Web Apps to Single Instance EBS EnvironmentsThis article is for anyone aiming to minimize AWS EBS costs and looking for instructions on setting up a single instance EBS web server…Sep 5Sep 5
Austin HuntA Look at VQE: Ground States Help Us SimulateA deep dive into the Variational Quantum Eigensolver (VQE) algorithm for identifying quantum system ground states.Dec 10, 2022Dec 10, 2022
Austin HuntIaaS, SaaS, PaaS: Analyzing a Sassy QuarterbackThere are a multitude of articles, videos, infographics, and probably even poems out there on the internet walking through the differences…Oct 25, 2022Oct 25, 2022
Austin HuntA Security Showdown in the Clouds: Comparing Security Philosophies of GCP and AWSAs a long-time fan of Jimmy Neutron, I can’t help but to think about his Neutronic Storminator invention (from Season 2 Episode 14 — “Out…Oct 24, 2022Oct 24, 2022
Austin HuntScrutinizing Single Sign On: Superior Security, but with StipulationsWhen facing the question of how to manage identity and access control for an entire organization composed of thousands (or even just…Oct 23, 2022Oct 23, 2022
Austin HuntThe ARC Protocol — Keeping Emails Afloat on the Voyage Through Strict Security PoliciesThis article will first provide some context around the SPF, DKIM, and DMARC protocols for email security, and will establish the…Oct 4, 2022Oct 4, 2022