|

No, a stolen iPhone isn’t a brick: How thieves access your data

Stop and read this. It may save you whole lot of grief and panic. Maybe you’ve heard that a stolen iPhone is nothing more than a brick. Perhaps you feel as if your data is safe. You have a password and it’s not 123456. You have find my iPhone. Allow me to burst your bubble…

|

Reading JSON data saved in a column and other SAS string function tricks

Sometimes data changes shape and type over time. In my case, we had a game that was given away free as a demo. We saved the player’s game state – that is, the number of points they had, objects they had earned in the game, etc. as a JSON object. Happy Day! The game became…

| |

SAS Proc Transpose – how have I not written about this before?

When I was young and knew everything, I would frequently see procedures or statistics and think, “When am I ever going to use THAT?” That was my thought when I learned about this new procedure to transpose a data set. (It was new then. Keep in mind, I learned SAS when I was pregnant with…

| |

How to stop gaslighting women in tech

According to that source of all knowledge on the interwebz, Wikipedia,  “Gaslighting is a form of psychological manipulation that seeks to sow seeds of doubt in a targeted individual or in members of a targeted group, making them question their own memory, perception, and sanity.” Have you ever had a brilliant, super-competent friend who doubted her…