Question From a Reader

The following question came in from a reader who happened to catch one of my posts on a programming email list. ==== As usual, I quite enjoy your detailed analysis coupled with historical contexts, since I learned my trade through those days (Sun SPARC workstations, VAX minicomputers running VMS, etc.).  They are always entertaining, usually …

Continue reading ‘Question From a Reader’ »

Do You Really Think Any of the On-line Services Keep Your Identity Information Safe?

Maybe the TJ MAXX breach didn’t scare you because you don’t shop there. Maybe the Target breach didn’t scare you because you don’t shop there. Maybe the Yahoo breach didn’t scare you because you never opened an account. The RNC data breach probably didn’t scare you, even though Time and other outlets report the information …

Continue reading ‘Do You Really Think Any of the On-line Services Keep Your Identity Information Safe?’ »

How Far We’ve Come – Pt. 18

The Internet has no shortage of “how to cross compile Qt for Pi Web pages.” Most of them kind of were “right enough” at one point in time for a subset of people. Most of them don’t bother to tell you what the host system is. I suspect many of them used a 32-bit host …

Continue reading ‘How Far We’ve Come – Pt. 18’ »

Why 1099?

Some pieces of this content have been in other posts by me. I’m going to put it all in one post so I can just send recruiters here rather than have the same conversation for the 32,767th time. Why 1099 instead of W-2 or Corp-Corp? I started in IT consulting well before we had the …

Continue reading ‘Why 1099?’ »

Migration Pretty Much Complete

There are always a few tweaks left to do here and there, but the migration is pretty much over. At some point in the next few hours the DNS changes will manage to reach every DNS cache on the Internet and everyone will be looking here. Thank you for your patience and sorry for any …

Continue reading ‘Migration Pretty Much Complete’ »