Open Space Technology is a method of organizing meetings and conference. It is a participation driven meeting where the agenda is created by those in attendance. Topics do not have to be around technology. At DevSpace there were Open Space session about martial arts, foster parenting, and of course beer. They are also a great way to meet other developers with similar interests.
Sometimes you just know that a person is on the way out the door. Even when it is more subtle there are signs and indicators that can alert you to the fact that one of your coworkers is looking for greener pastures. Many of these are changes in the normal behavior of your coworker. Indicators are when they do not act as they have or do things they have not previously done.
It's pretty much a fact of human existence that not only will you have to deal with challenging, broken people, but that as an adult, you may not have the option to avoid them. The point of this is recognizing that there are very few people who start off as intolerable jerks, but there are lots of people who end up that way as a result of circumstance.
Inversion of Control is a way of designing code to implement the Dependency Inversion Principle. In it the custom code written for the functionality of the application does not control the flow of control. Instead that is received from a more generic framework.
When selecting a development stack for a side project, you need to maximize the amount of time that you have available for actually getting things done. The goal of a working side hustle is to make extra money on the side, not to be vehicle for exploring a new framework, language, or approach.
The decision to go back to school or to attend in the first place is big and life altering. It should not be taken lightly. It's a very personal and difficult decision to make.
Designing a web API (or Application Programming Interface) that lives on a webserver can be very difficult. There's a lot to consider when building an API. While we frequently try to simplify the process down to where it feels the same as making a simple library for our own use, this approach really doesn't get us where we need to be.
Many companies prefer to promote from within, either for the prestige of claiming to do so or because internal candidates are a known quantity and quality. There's a difference between interviewing at a new location with people who don't know you or have not worked with you and interviewing in front of your coworkers and people you've been working with for years. When applying and interviewing for an internal promotion you need to use different strategies to be successful.
Real personal change is hard. Not only do you have to pick an appropriate goal, but you have to slog towards it over an extended period of time. Reinvesting your gains in any worthwhile activity or life goal is not all that hard, but it has to be approached intentionally in order for it to work. The idea of big goals is to create a better version of yourself, and nothing short of good process is going to make that happen in a sustainable fashion.
Network Access Control (NAC) attempts to combine end-station security with network security and authentication. It is used to control access to a network via policies and protocols. These include when the policies are applied whether before or after accessing the network as well as how information about the device accessing it is obtained.