The Chronicle

of a ColdFusion Expatriate

Authoring Emacs Packages

August 04, 2015

Have you extended Emacs in a novel way? Do you want to share your creation with the wide world of Emacs users? Well then, you will need to learn how to create a proper Emacs package.

Packaging for Emacs is generally pretty easy and there is a lot of help available, both within Emacs itself and obviously on the Internet. There are a few things, though, that are conspicuously and annoyingly hard to find help with so I decided to document them for you.

Come with me and learn how to create an Emacs Package from scratch.

What I've Learned From 20,000 PHP Files

July 14, 2015

Aside from the well-known considerations of the computer science discipline like algorithmic efficiency, decoupling, cohesion, and so on, working on a huge codebase with a large number of engineers brings its own challenges.

Since joining Wayfair, I have had the opportunity to work on a larger system and with a larger team than I ever have before.

This is what that experience has taught me.

A Gentle Introduction to Emacs Configuration

July 05, 2015

Since giving my talk, Evil Mode, or, How I Learned to Stop Worrying and Love Emacs at the Boston Vim meetup group, I have been inundated with questions, both about how I pulled off this transition and about Emacs itself and how it works.

One question that comes up more than the others is how to “properly” configure Emacs. Because Emacs is essentially a Lisp engine that just happens to ship with text editing capabilities, configuring it requires writing or modifying some Lisp expressions, which is quite different from how Vim is configured.

Here, I will gently guide you through the very basics of Emacs configuration and show you where to get help so that you can embark on your Emacs customization and personalization journey with confidence.

Shadow IT Is the Canary in the Coal Mine

June 13, 2015

In the early 20th century, long before “information technology” was a phrase anyone had heard of, coal miners brought canaries into the mines with them because the birds, being warm-blooded and more sensitive than humans to most environmental effects, would become ill from carbon monoxide or other toxic gases found in the mine long before the miners would, giving them a chance to escape or take protective action.

Such “animal sentinels” saved many lives by acting as an early warning system for dangerous conditions that the humans could not sense themselves (carbon monoxide in particular being entirely without scent), and the phrase “canary in the coal mine” came to be used as a general term for something that provides a signal of danger.

“Shadow IT” is a term used to describe systems put in place within organizations without explicit organizational approval. A very simple example would be some team deciding to use their personal Google Docs accounts to track project data in spreadsheets rather than Microsoft Office documents on an internal file share. Shadow IT is generally perceived as a security or privacy risk because the organization doesn’t have the access and auditing controls built into approved solutions.

Nevertheless, Shadow IT is a sign of danger. It’s an indication that approved solutions don’t meet all of an organization’s needs. It should be treated not strictly as a departure from the acceptable path, but as a strong signal that existing solutions are inadequate.

Evil Mode

June 03, 2015

“Evil Mode, or, How I Learned to Stop Worrying and Love Emacs”

That was the title of the talk that I gave at the Boston Vim Meetup group. As you all may know, I was a Vim user for 15 years and I’ve been attending the Boston Vim meetups for quite a while, so this was an interesting experience for me.

I think it might be an interesting experience for you, too, so I’m posting the video here so you can all enjoy it in the privacy of your own homes!