15 years of Git: How to get started or learn something new
If there’s anything that’s changed software in the past two decades, Git is at the top of the list. read...
Love or hate chat? 4 best practices for remote teams
Chat is a part of most people’s daily lives, especially if you work in tech, and especially if you work with teammates located in different parts of the world. It can be a great way to achieve these goals: read...
How to use pyenv to run multiple versions of Python on a Mac
Managing a local Python development environment continues to be a challenge, even for experienced developers. While there are well-documented strategies for package management, there is another step necessary to ensure you are running the version of Python you need when you need it. read...
How to avoid man-in-the-middle cyber attacks
Whether you’re sending data on your computer or talking to someone online, you want to assume some level of security and privacy. But what if a third party is eavesdropping online, unbeknownst to you? And worse, what if they’re impersonating someone from a business you trust in order to gain damaging information? This could put your personal data into the hands of dangerous, would-be thieves. Welcome to what’s called...