Several years ago, I wrote a series of article about implementing a small network that has some “enterprise” network features. For the most part, these aren’t necessary, but I believe, as we deal with more mobile devices and IOT devices, we will want to isolate our networks into segments, and implement firewalls between the segments, even for small LANs. Fortunately, our phones are somewhat safe — Windows hacking over the LAN in the late 1990s taught everyone a lesson. That said, there are a lot of camera, sensors, and other devices that are on LANs, running with default passwords, and subject to sniffing.
I wrote a series of articles about Django 1.8 that has continued to get traffic. Django is now at 1.10!
In yesterday’s post, I talked about fixing up old PHP code to be safer.
There’s another anti-pattern common in old PHP code, and that’s mixing the display logic with the output logic. While some of this is inevitable, nowadays, the rule is to use a templating system like Twig to separate out even small bits of HTML code from the logic.
WordPress does this on the front end via Underscore templates, but configured to use Handlebars-like syntax.
This is a PHP class that does the same thing with PHP. I wrote it so I could use the same, or similar, templates on both the client and server side.
Continue reading WP’s Backbone-like Templating Language
I’ve been doing a lot of WP hacking, but my website was on a very old copy of Drupal (version 6!) so I thought it best to transition to using WP for my personal blog.
The old site is here.
They’re both good platforms, but the WP market just seems to be dominating, especially for lower-cost sites.
WP’s core code is still a maze.
Every time I get a grip on one part of the codebase, I go into another part, and it’s completely different. The code quality has improved, though, so, it’s pleasant.
This is a revision of an old article, from the old website, describing some things I learned about collecting names.
Several years ago, for the Obama elections, I had to manage a bunch of sign-in sheet info. To perform the data entry, I did a few things to make life easier (for me).
Continue reading A Volunteer Sign-In Tool
One morning, I started wondering how RAID 5 parity works to rebuild a disk array. It seemed “magical” to me, that you can get redundancy and still use most of your disk capacity. So I searched for it… and turned up not very much info, and one other person’s unanswered question. A few articles explained it, but in a little more detail about performance, and less detail about the actual parity function. So I wrote this. The good articles were at:
Continue reading RAID 5 Parity. What is it, and how does it work?