Conversations about technology between two friends who disagree on plenty, and agree on plenty more.
…
continue reading
Jim McQuillan Podcasts

1
Episode 4: Functional Programming - You're probably already doing it
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57Show notes and things to think about: Functional programing isn't academic. It isn't overwhelming. It isn't impossible to use. It isn't inapplicable to ordinary problems like the ones you're solving right now. You can use functional techniques in almost any modern programming language. In fact, you probably already are. Main pillars of FP: Pure fun…
…
continue reading
Show notes: Take-aways from the episode: If you have a compute intensive part of your web application, it may make sense to implement that bit of code in a compiled language like C, C++ or Rust and then compile them to WASM so they can be executed in the browser. Security and Portability. WASM code is secure as it utilizes the browsers' sandbox and…
…
continue reading

1
Episode 2: Bitcoin, Cryptocurrency, and the Blockchain
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Show notes: Take-aways from the episode: Crypto is not really anonymous Crypto is both regulated and taxed (at least here in the US) Legal uses of crypto outweigh illegal uses. This stuff is legitimate. There are dangers, but crypto is something you might legitimately possess There are scammers everywhere. Protecting the private key in your wallet …
…
continue reading

1
Episode 1: Out of the Datacenter and into the Cloud
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Show notes: Have you thought about moving your computing into the Cloud? This episode takes a look at a real-world adventure that Jim went through when moving his computing infrastructure from purchased servers in a rented rack in a datacenter to a VM Running in a cloud service provider using Docker, Linux, managed PostgreSQL. He covers the steps h…
…
continue reading
Show notes: There are many scams, some to get your password(s), some just for money. Here's a sample list: https://www.experian.com/blogs/ask-experian/the-latest-scams-you-need-to-aware-of/ Lists of login methods: https://testdriven.io/blog/web-authentication-methods/ https://www.logintc.com/types-of-authentication/ Who implements Passkeys? https:/…
…
continue reading