Development Category
Focused on coding, languages, and development.
01/28/2019
Storing currency in PostgreSQL
by Christopher Choi
There are different ways we can store currency in PostgreSQL, this blog post will cover the money and numeric type.
11/27/2018
Prevent an Outdated and Broken bin/setup with This Simple Trick
by Alex Piechowski
How often do you run this `bin/setup` if it's only ran when you set up your repo? Most developers setup their environment only every once in awhile. What happens when changes to the codebase happen and the bin/setup isn't modified as well?
09/06/2018
Writing a good bin/setup
by Matt Bettinson
What it takes to write a project setup script to ease on-boarding headaches and reduce company overhead
08/21/2018
Automatically Migrate from Factory Girl to Factory Bot
by Alex Piechowski
Gem updates are tedious. Gem name changes are even more tedious. This quick script converts Factory Girl references to Factory Bot references.
08/07/2018
Deep Work and Remote Work
by Matt Bettinson
By working deeply, you can achieve the best work you are capable of.
07/18/2018
Automate Scheduled Security Scans With CircleCI
by Christopher Choi
Stay on top of vulnerabilities by automating security scans with workflow schedules
07/10/2018
How to Ask Great Questions Online
by Alex Piechowski
All devs ask questions. Good questions save time and effort for both the asker and answerer, follow these tips to become a superstar question asker and super power your development cycle with and without community assistance.
06/25/2018
3 Developer Onboarding Tips From My Recent Experiences
by Christopher Choi
This blog post briefly explores experiences and lessons that I have learned since joining the Rietta team; experiences that developers in a similar position can benefit from.
10/11/2015
What is an Abuser Story (Software)
by Frank Rietta
In software development and product management, an abuser story is a user story from the point of view of a malicious adversary. Abuser stories are used with agile software development methodologies as the basis for defining the activities that should be actively blocked or mitigated by the software and proven by automated regression testing.