Filina Consulting, Inc.


What Do Speakers Look for in Reviews?

February 15th, 2018

Every public speaker is different, so let me tell you to what I personally pay attention in post-talk reviews.

Read more

Testing Legacy PHP Scripts

January 26th, 2018

I gave myself a challenge: to test a legacy "controller" in isolation, yet with minimal impact on the original code.

Read more

How I Got 100% on Google PageSpeed Insights

January 4th, 2018

I set out to redesign my blog and throw in my consulting services in there. I decided to try a few techniques that I learned over the past couple of months, to get some practice. 90% of my work consists in experimenting, so that my customers would later benefit from the results.

Read more

Why Objects Over Arrays?

January 26th, 2017

I saw a tweet earlier today “there seems to be this obsession with turning everything into an object”. Here’s a detailed response as to why using objects instead of arrays is a good idea, in my opinion. The Problem I once took over a project written in ActionScript 3. It was a fairly simple project. Five mini-games […]

Read more

Increase Efficiency of Remote Communications

December 12th, 2016

Do you want to increase the efficiency of your remote communications by a factor of ten? Keep reading then. Respond immediately. If you have all the necessary information to respond to an e-mail, do it now. You already spent time reading the e-mail. By not responding immediately, you are wasting time re-reading it next time and categorizing […]

Read more

Conference Organization: Speaker Agreement

November 22nd, 2016

At ConFoo, we use a speaker agreement to ensure that accepted speakers take their commitment seriously and understand the impact of a cancellation. We used to lose thousands of dollars due to speakers cancelling after we already purchased their flight (as a non-profit, that hurts). It’s also an opportunity to remind them to be respectful and make sure […]

Read more

Yahoo!’s Password Security

October 13th, 2016

I posted this tweet recently and got many replies. Since I was answering the exact same few questions dozens of times, I’d like to summarize everything here. I will also add some new information that I gathered that will clear many things up. Yahoo: “Your password is too similar to the one you’ve used previously.” You wouldn’t know unless […]

Read more

Re: When it comes to submitting talks, how many is too many?

September 12th, 2016

I read this interesting post by Cal Evans about submitting conference proposals. He makes some very valid points, but I’d like to add my own experience as an organizer, so that when you submit, you have multiple perspectives. Here are my replies to some of the points made. Filter your list to only include talks that […]

Read more

MySQL Duplicate Entry, But Not Really

August 25th, 2016

I chased an interesting bug today. MySQL was complaining about “Integrity constraint violation: 1062 Duplicate entry”. I had all the necessary safeguards in my code to prevent duplicates in tha column. I gave up on logic and simply dumped the contents of the problematic column for every record. I found that there was a record with […]

Read more

File Permissions for Web Servers

June 21st, 2016

Many of you have asked me to write an article about Unix file permissions for web servers. This will serve to combat all those recommendations that are floating around, such as chmod -R 777, which I like to call the “hacker’s jackpot.” Basics of File Permissions The first concept to understand is the three roles. The user has the […]

Read more

Older Posts

Phone: +1 514-918-7866 | E-mail: