CSS Resources
https://www.w3schools.com/css/default.asp https://css-tricks.com/ https://css-tricks.com/almanac/properties/b/box-shadow/
https://www.w3schools.com/css/default.asp https://css-tricks.com/ https://css-tricks.com/almanac/properties/b/box-shadow/
Python Resources - Summary Python 3.8.5 documentation The Python Tutorial How To Code in Python 3 DigitalOcean eBook: How To Code in Python How To...
Python Resources - Summary how-to-uninstall-node-js-from-mac-osx how-to-install-python-3-and-set-up-a-local-programming-environment-on-macos how-to-us...
Configure SSH Key Based Authentication for Linux Servers https://docs.spring.io/spring-boot/docs/current/reference/html/deployment.html https://www.bael...
Configure SSH Key Based Authentication for Linux Servers https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on...
Linux File Compression introduction to file compression tools on linux servers
Linux File Hierarchy Standard Resources Linux Foundation - Filesystem Hierarchy Standard The Linux Assigned Names And Numbers Authority LSB Provider N...
Linux permissions Each file has three modes of access: the owner the group all others
Red Hat Ansible resources Latest Documentation - Latest version User Guide - Latest Version Command Line Tools - Latest Version Working with Playboo...
Java Virtual Machine (JVM) resources 10 JVM Options for Java Production Application Java Performance Definitive Guide Top 5 Courses to Learn JVM Inter...
Java Secure Coding resources
Go resources
How to convert base 10 (decimal) to binary https://www.cs.odu.edu/~jbollen/cgi-bin/dec2bin.cgi?dec=46
All information presented below is not original content, this is a summary of the content that was presented by Jez Humble within the O’Reilly lecture & ...
This article is a step by step guide on how to install / setup an Ansible control server and at least one server that will be managed by the Ansible control ...
The following are new articles, blogs, videos, podcasts, tutorials, code samples, and etc. that I discovered this past week.
References https://gsuite.google.com/learning-center/products/forms/get-started/ https://gsuite.google.com/learning-center/tips/forms/ https://snipe.net/2013...
Documentation and more information about the Vagrant VMware Desktop provider can be found on the Vagrant website
Vagrant Key Sites Vagrant - the command line utility for managing the lifecycle of virtual machines Main Vagrant site Vagrant Download Discover Vagran...
All information presented below is not original content, this is a summary of the content that was presented by Sam Newman within the O’Reilly lecture & ...
Orchestration Rely on a central brain to guide and drive the process much like a conductor
All information presented below is not original content, this is a summary of the content that was presented by Susan Fowler within the O’Reilly books: Mi...
https://jekyllrb.com/docs/ruby-101/ https://jekyllrb.com/docs/ruby-101/#bundler https://jekyllrb.com/docs/ruby-101/#gems
https://packetlife.net/media/library/16/Markdown.pdf https://www.markdownguide.org/ https://guides.github.com/features/mastering-markdown/ https://g...
Jekyll references https://jekyllrb.com/ https://jekyllrb.com/docs/ https://jekyllrb.com/docs/installation/ https://jekyllrb.com/docs/step-by-step/01...
For maintaining my focus on improving and maintaining my physical, mental, and emotional health I track a set of actions to complete every day. The intent o...
This blog entry contains a list of the trainings completed in 2024. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the trainings I completed in 2023. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2023. Links included for the summaries and notes if I added them to my site.
Java Development Environment Setup on MacOs Setup Steps
This blog entry is a summary of the book Modern Cybersecurity, Tales from the Near-Distant Future. Authors include Jennifer Czaplewski, Keyaan Williams, Bry...
Arkansas Beer - An Intoxicating History
Think Again - The Power of Knowing What You Don’t Know
Amazing Joy
This blog entry contains a list of the trainings I completed in 2022. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2022. Links included for the summaries and notes if I added them to my site.
This blog entry contains the current Mays Family logo.
Extreme Ownership - How U.S. Navy Seals LEAD and WIN Authors Jocko Willink Who is Jocko Willink? Leif Babin Who is Leif Ba...
This blog entry contains a list of the books I read or listened to in 2021. Links included for the summaries and notes if I added them to my site.
This blog entry is a summary of the book Stick Together, a simple lesson to build a stronger team by the authors Jon Gordon and Kate Leavell.
Eric Musselman Quotes
Leadership books and references. Beyond Band of Brothers By Major Dick Winters with Colonel C. Kingseed Extreme Ownership - How U.S. ...
Beyond Band of Brothers Authors Major Dick Winters Who is Dick Winters? Who is Dick Winters? with Colonel C. Kingseed ...
The following blog is a summary of the learning from the Audbrey Marcus podcast, #155 Truth and Responsibility with Jordan Peterson.
The following is a summary of tips from an article written by Elisabeth Leoni on an interview of Google’s resident productivity expert Laura Mae Martin. The ...
At the start of 2019 I decided to try a new method for my task tracking, notes organization, overall journal, and organization approach. I chose the bullet ...
The following is good advice obtained on providing feedback and receiving feedback.
The following are new articles, blogs, videos, podcasts, tutorials, code samples, and etc. that I discovered this past week.
This blog contains a list of random mottos to live different parts of your life by. All of the mottos below are not original.
This blog entry contains a list of the trainings completed in 2024. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the trainings I completed in 2023. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2023. Links included for the summaries and notes if I added them to my site.
Java Development Environment Setup on MacOs Setup Steps
This blog entry is a summary of the book Modern Cybersecurity, Tales from the Near-Distant Future. Authors include Jennifer Czaplewski, Keyaan Williams, Bry...
Arkansas Beer - An Intoxicating History
Think Again - The Power of Knowing What You Don’t Know
Amazing Joy
This blog entry contains a list of the trainings I completed in 2022. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2022. Links included for the summaries and notes if I added them to my site.
Extreme Ownership - How U.S. Navy Seals LEAD and WIN Authors Jocko Willink Who is Jocko Willink? Leif Babin Who is Leif Ba...
This blog entry contains a list of the books I read or listened to in 2021. Links included for the summaries and notes if I added them to my site.
This blog entry is a summary of the book Stick Together, a simple lesson to build a stronger team by the authors Jon Gordon and Kate Leavell.
Eric Musselman Quotes
Leadership books and references. Beyond Band of Brothers By Major Dick Winters with Colonel C. Kingseed Extreme Ownership - How U.S. ...
Beyond Band of Brothers Authors Major Dick Winters Who is Dick Winters? Who is Dick Winters? with Colonel C. Kingseed ...
The following is good advice obtained on providing feedback and receiving feedback.
The following are new articles, blogs, videos, podcasts, tutorials, code samples, and etc. that I discovered this past week.
This blog entry contains a list of the trainings completed in 2024. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the trainings I completed in 2023. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2023. Links included for the summaries and notes if I added them to my site.
Java Development Environment Setup on MacOs Setup Steps
This blog entry is a summary of the book Modern Cybersecurity, Tales from the Near-Distant Future. Authors include Jennifer Czaplewski, Keyaan Williams, Bry...
This blog entry contains a list of the trainings I completed in 2022. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2022. Links included for the summaries and notes if I added them to my site.
This blog entry contains a list of the books I read or listened to in 2021. Links included for the summaries and notes if I added them to my site.
Post-Quantum Cryptography (PQC) Standardization Project Main NIST project page Memorandum on Improving the Cybersecurity of National Security, Departmen...
This blog entry is a summary of the book Stick Together, a simple lesson to build a stronger team by the authors Jon Gordon and Kate Leavell.
Table of Contents Break in: How to get into cybersecurity and build a rewarding career Cybersecurity Career Options NICE Framework Skill Sets Trai...
Resources 2024-25 General WMA Regulations Wildlife Management Areas (WMAs) White Rock Mountain Recreation Area & Campground White Rock ...
What is Public Key Cryptography? Is a cryptographic system that uses pairs of keys. Also, known as asymmetric Cryptography. These two keys are mathematical...
Configure SSH Key Based Authentication for Linux Servers https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on...
Java Secure Coding resources
All information presented below is not original content, this is a summary of the content that was presented by David Gasca in Medium blog entry The Silent M...
All information presented below is not original content, this is a summary of the content that was presented by David Gasca in Medium blog entry The Silent M...
All information presented below is not original content, this is a summary of the content that was presented by David Gasca in Medium blog entry The Silent M...
All information presented below is not original content, this is a summary of the content that was presented by David Gasca in Medium blog entry The Silent M...
Table of Contents Break in: How to get into cybersecurity and build a rewarding career Cybersecurity Career Options NICE Framework Skill Sets Trai...
Resources 2024-25 General WMA Regulations Wildlife Management Areas (WMAs) White Rock Mountain Recreation Area & Campground White Rock ...
What is Public Key Cryptography? Is a cryptographic system that uses pairs of keys. Also, known as asymmetric Cryptography. These two keys are mathematical...
The following is good advice obtained on providing feedback and receiving feedback.
The following are new articles, blogs, videos, podcasts, tutorials, code samples, and etc. that I discovered this past week.
The following are new articles, blogs, videos, podcasts, tutorials, code samples, and etc. that I discovered this past week.
Modern Software Engineering Authors David Farley Who is David Farley?
This blog entry contains a list of the books I read or listened to in 2024. Links included for the summaries and notes if I added them to my site.