I hereby claim:
- I am davisc0801 on github.
- I am davisc0801 (https://keybase.io/davisc0801) on keybase.
- I have a public key ASBZtZDLCJSuqyfJdozJ8i0nOsWKCw2XgpxVA4OodBCvSwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
The following is my calander snapshot. It's optimistic and the times might be flexable, but it's pretty close to how I want to spend my time once I start job hunting seriously.
What motivates you?: I'm lacking in motivation right this instant, but I'm driven by social justice and the ability to learn and teach.
How will you keep yourself going when faced with rejection in the job search?: I'm planning on leaning on my resource net and working through rejection by volume and not getting attached until I sign the offer.
How will you hold yourself accountable to your plans? (Ex: Attend Mod 5, meet with cohortmates, attend Kayt's coffee shop hours, etc.): I'm absolutely going to continue to psyically come to Turing, or at least work in a different space then my apartment.
| Section 1: | |
| Short-circuiting logic is present in other languages, but usually it's in the sense that boolean evaluation stops early, but not using it as a default value the way JS does. The nearest analogue is memoization in ruby. | |
| Type coercion is nice over an explicitly typed language, but the === operator is absolutely required. | |
| Section 2: | |
| Javascript requires explicit returns. | |
| For loops are shorthand for the normal counter loops, (while i > limit, i++) |
| This app could serve as a mapped database of CCTV cameras operated by law enforcement or private parties. This app would call on the google maps API and could have users anonymously report other cameras. With facial recognition on the rise, having a map of cameras that may be employing that tech should be made public information. | |
| With public safety being less and less existent (2 mass shootings during our intermission week), having an app that can push alerts if a nearby threat is in progress as well as mapping out "safe zones" is worth our time. We can use google maps API as well as Twilio for push messaging, and having a map can help people know where to go if events like these occur instead of complete panic. |
| Man in the middle attacks - Or - Never use Starbucks Wifi. | |
| What the heck is a MITM Attack? | |
| Normally, our computer will talk to the access point, which is a switch or a router, and then the request is routed across the web through DNS and eventually the servers where the content is hosted. | |
| A man in the middle attack can mean two things. The first is where a third party eavesdrops on the connection, the second is when the attacker pretends to be the access point and your connection passes through them before going through the actual access point. | |
| This is a two part attack. The attacker needs to position themselves in middle between the router and the target, and this is done through ARP spoofing. ARP is how routers keep track of the MAC addresses of devices and the internal IP addresses of connected devices. |
| # Outreach & Networking Plan | |
| As we've discussed, meeting people, forming relationships, and having conversations are the key pieces to getting your foot in the door at any company. It's important to be proactive in your approach to outreach and networking, so it's necessary to make a plan for what you'll try to further your networking. | |
| Identify a contact you will reach out to by the end of this module. This could be a mentor, alum, or anyone from your current network. Describe: | |
| 1. Why you want to connect with this person and what you want to talk about - We have a shared friend and he has industry experience. Right now I'd like to probe the waters around hiring practices, skills I need to keep sharp, and what work is like vs. Turing, since there's no point of comparison for me right now. | |
| 2. When you will contact them by and how you plan to meet - I'm reaching out on slack, and realistically the only time I have to meet will be during the break. I'll attempt to set something up once my break plans are more |
Some people know while they are growing up what they are going to do for the rest of their lives. I am not one of them. I've worked as a cashier, a barista, a janitor, and most recently as an insurance agent. Now that I'm trying my hand as a programmer, it's a path I should have tried from the get-go. That wasn't really possible at the time, growing up working for a paycheck always came ahead of what would help long-term, but every carrier change was for the same reason. I had hit the limit of how far I could go with that job, and I didn't want to sit at that ceiling.
All of my previous carriers have had me working on a team with great people to keep clients satisfied, and at the end of the day programming is no different. I've always had a good understanding for how things fit together and work, and problem solving has come naturally to me. Programming is a good fit for my brainpattern, and I'm lucky to be in a place in my life where I have the stability and time to change carri
Answer these Check for Understanding questions as you work through the assignments.
We are a fast growing company that is looking to provide services based on the principals of mutual aid and development of the common good. We strive to match services such as housing, food assistance and education with those that need it for little or no cost.
Preferred experience:
Working knowledge of programming fundamentals and object oriented programming.
Experience with Ruby and the Rails framework.
Analytical, problem solving and conceptual thinking skills.
What have you learned about the use of agile vs. waterfall in software projects? - The internal steps of waterfall and agile processes are the same, however the timeframe of agile is much more rapid with a target of 2 days from start to finish. In agile, there is the additional step of soliciting feedback at the end of the sprint. If the timeframe for the completion of a sprint is over a month, then an agile process in name is waterfall in function.
How did you and your group approach project management in this project (what tools did you use, how did you hold each other accountable, etc.)? - In our case, our workflow was that the overwhelming majority of work was done in a pair, face to face. As such our planning was limited to high level whiteboarding and driver/navigator paired programming. As such accountability and division of labor wasn't as much of an issue as if the majority of our work was done remotely.
What role did you take on in the project? - I was focused on whiteboarding