As you know, based on a few of the tutorials that I’ve published recently, I have a YubiKey that I’ve been learning how to take full advantage of. In previous tutorials I demonstrated how to implement U2F in your web application, but most YubiKey devices do so much more than just U2F authentication. For example, the YubiKey NEO and YubiKey 5 have support for U2F, FIDO2, OpenPGP, OTP, and a bunch of other crazy technologies.
In this tutorial, we’re going to explore using the YubiKey as a smart card for storing our PGP signing, encryption, and authentication subkeys.Read More
This past week I had the honor of attending the consumer electronics show (CES) in Las Vegas, Nevada. This had been a lifelong goal of mine to attend the event and get a firsthand look at all the latest and greatest technology releasing in 2019.
While mostly unrelated to development and the material typically found on The Polyglot Developer, I wanted to give a summary of the event with some of the things I enjoyed and some of the things I didn’t about the event.Read More
The 2018 year is winding down so it is time to reflect on some of the things that have happened in terms of The Polyglot Developer and all of its channels.
Let this be a statistics report for everything that has happened on the blog, YouTube channel, and podcast. If you’re interested in adventuring into the world of technical content production, this will give you some perspective into what to expect.Read More
With the 2018 year coming to an end, I wanted to take a moment to appreciate the guest content that was submitted and published on The Polyglot Developer this year. While I love sharing technical content with everyone, I love it even more when the community gets involved and does the same.
Let’s take a look at the guest tutorials that appeared on the blog and the guest authors that wrote them.Read More
There are a lot of password managers on the market, some in the cloud, some local, all with features that may or may not be useful in all circumstances. I’m personally an advocate of being in control of your secure information and shedding reliance on closed source or cloud alternatives. This is why I use pass, the standard unix password manager.
The pass application is Mac and Linux compatible, but Windows support probably isn’t impossible. The application works by maintaining a list of password files that have been encrypted using GPG, a widely used cryptography software. Decrypting the files will result in access to your password information.
We’re going to take a look at using pass and see why it is a convenient option for password management.Read More
Back in 2015, I shared my story about becoming a Developer Advocate at Couchbase in an article titled, Ending My Adventure at UC Merced and Starting Fresh.
In the three years that I’ve been at Couchbase, I’ve had a positive impact towards spreading awareness, getting product adoption, and making developers successful. I’ve also grown as a developer as well as an evangelist in the process.
This is where my story at Couchbase ends and my new adventure with HERE begins!Read More
I don’t typically write about these topics since they aren’t on the subject of development and operations, but this week Google AdSense put my account on restricted probation for violating its policies, something I hadn’t intentionally planned on doing.
After receiving an email from Google and visiting the policy area of the Google AdSense dashboard, I learned that I had a Valuable Inventory: No Content violation for a domain that wasn’t mine and I hadn’t even heard of.
So what do you do when you’re in violation for something you do and don’t have control over?
We’re going to see some of the things that you can do to keep your account in good standing, beyond the obvious things such as being annoying.Read More