15 years of Git: How to get started or learn something new
Apr07

15 years of Git: How to get started or learn something new

If there’s anything that’s changed software in the past two decades, Git is at the top of the list. read...

Read More
Love or hate chat? 4 best practices for remote teams
Apr07

Love or hate chat? 4 best practices for remote teams

Chat is a part of most people’s daily lives, especially if you work in tech, and especially if you work with teammates located in different parts of the world. It can be a great way to achieve these goals: read...

Read More
How to use pyenv to run multiple versions of Python on a Mac
Apr07

How to use pyenv to run multiple versions of Python on a Mac

Managing a local Python development environment continues to be a challenge, even for experienced developers. While there are well-documented strategies for package management, there is another step necessary to ensure you are running the version of Python you need when you need it. read...

Read More
How to avoid man-in-the-middle cyber attacks
Apr07

How to avoid man-in-the-middle cyber attacks

Whether you’re sending data on your computer or talking to someone online, you want to assume some level of security and privacy. But what if a third party is eavesdropping online, unbeknownst to you? And worse, what if they’re impersonating someone from a business you trust in order to gain damaging information? This could put your personal data into the hands of dangerous, would-be thieves. Welcome to what’s called...

Read More