Website:

Specializations:

Outgoing Links:

Patrick McKenzie
Subscribe to RSS:
The post discusses Jamie Zawinski's Law, which states that every program attempts to expand until it can read mail, and argues that this law reflects a deeper human desire for social connection rather than merely software feature ...
A curated list of 12 energetic Christmas songs that demand attention and add excitement to holiday celebrations, contrasting with more traditional tunes.
The way you pull a sticky note off a stack significantly affects its adherence, with a tangential pull being the most effective method.
The author shares the most frequently used Jujutsu VCS commands as a cheat-sheet for those considering replacing git with jj. The author switched to using Jujutsu Version Control System as a daily-driver frontend to git and refine...
The article describes a system to make searching for credit card offers quick and easy, the process of organizing the data in a Google Sheets Workbook, and extracting, categorizing, and formatting the offers with an LLM. It also d...
The text discusses a problem encountered while using BeeWare’s Briefcase for a small project, and the solution to fix the error related to libgssapi_krb5.so.2. The author explains the diagnosis and the fix, which involves building...
The article describes a method called 'roll-invert-unroll' to easily replace a duvet cover. The author explains the method and its benefits, and encourages readers to try it.
The author composed an 8-bit version of their own theme song and shared it on the Internet. They had previously composed the song but struggled to notate it. During the pandemic, they decided to arrange a simpler version and used ...
The article describes how the author improved a simple toothbrush timer Alexa Skill using Go, GPT-4, and DALL-E. The skill guides users through a 2-minute tooth-brushing session and provides facts about teeth. The author initially...
The text discusses the connection between death and divination, and how forensic autopsies lead to the capture of murderers. It also talks about the importance of performing a post mortem after the death of a project or product to...
The text provides step-by-step instructions on how to build and assemble a case for the Flipper Zero's Wifi Devboard without needing to own a 3D printer. It includes details on obtaining 3D files, sending the files to a marketplac...
The text discusses a common pattern for bugs in code, called De Morgan's Flaw, which occurs from applying De Morgan’s Laws incorrectly. It explains the pattern and how to refactor unwieldy code to prevent this kind of bug. It also...
The article discusses the impact of inaccuracies in estimation on the importance of design. It emphasizes that neglecting design and long-term thinking can lead to faster delivery of individual products but slow down the overall p...
The text provides an incomplete list of poor names for libraries, modules, projects, and teams in software engineering. It discusses the importance of giving good names and the problems associated with poor names. It also highligh...
The text discusses the implementation of Circuit Breakers at Hipmunk to automatically deal with third party outages. It explains the terminology, architecture, and API of the Circuit Breaker system, and highlights the benefits and...
The text is a cautionary tale of how the author misapplied a software tool to a problem and the lessons learned from it. The author describes the nature of the problem, the code used to solve it, and the consequences of the soluti...
The text discusses the Sorting Hat from the Harry Potter series and its comparison to a hash function in computer science. It explores the properties of the Sorting Hat and how it would fare as a hash function. The author conclude...
The Phoenix Project is a fiction novel that weaves a story of an IT manager, Bill, newly promoted to lead the entire dysfunctional engineering department of Parts Unlimited, an embattled auto manufacturing company. The success of ...
The text discusses the importance of ensuring that functions only do one thing in software engineering. It emphasizes the need for clear and precise function names to accurately reflect their purpose. The author shares their exper...
The text discusses a shell function to visually emphasize search terms in the terminal output of a program. It provides solutions for highlighting selected words in the terminal output using grep and discusses existing solutions. ...

0Zero-based ordinals

2020-09-21

The article discusses zero-based ordinals and their use in programming languages. It explains the concept and proposes names for the elements beyond the first. The author also mentions Benford's Law of Numbers and its relevance to...
The text discusses the importance of spelling range conditionals in a specific way to make the code more readable and reduce the chance of errors. It emphasizes the benefits of standardizing the spelling and the implications for t...
The text discusses the pattern of handling the empty case in functions and provides alternative practices to reduce the code needed to handle the empty case. It addresses the motivations for handling the empty case, such as defens...
Left of Bang is a manual for building and using situational awareness, an understanding of human behaviour, critical thinking and decision making. It provides a concrete framework for reading people that goes beyond combat and unc...