I’ve been a “free athlete” for about three months now, and I’m very happy with the results. As some of you may know, I used to be a pretty avid cyclist. When I was riding regularly, I would clock about 200 miles per week either on my own or with groups. I was in the best shape of my life. I got married and priorities shifted. While I miss riding, I don’t miss the number of hours that 200 miles required to ride. It was great for clearing my mind and creating a space for moving meditation, but I’d created a part-time job for myself.

I forgot how I discovered Freeletics, but I’ve really enjoyed getting back into some form of shape with far less of a time requirement. I started out with the BodyWeight app, then added the Running app later into my training. I haven’t lost a lot of weight, but I feel stronger and more fit than I even did with cycling. Freeletics is a subscription service, so you’re paying for ongoing updates to the service and the AI that the Coach is built on. You can do the workouts for free without the Coach, but you probably won’t get as much out of it as you could with the Coach. It’s also way cheaper than a gym membership and a personal trainer at less than $7/month.

There’s a phrase in the community that “Coach knows best”, and I can confirm that this is accurate. I’ve always felt challenged by the workouts prescribed and more often than not intimidated. I’ll be honest: it’s hard. If you’ve never trained in this way before, you’re going to hate the first few weeks. You will experience pain, discouragement, and sometimes fear of the workout to come. Everyone says it, and I’ll join in: keep going. There’s a sort of mental wall that you must get over in order to prove to yourself that you’re capable. You’ll know when you’ve crossed it. I was in week four or five before I started to really enjoy the workouts. 50 burpees is no longer intimidating once you’ve done Helios. Every workout since leaping the mental wall has been awesome and well worth some of the initial hurdles.

Check it out here if you want 10% off:

Or here if you don’t want 10% off:

Refactor or Hack

In my day to day, I often come across code that was written before I arrived. Sometimes it’s great. Easy to understand, abstracted at an appropriate level, maybe even commented (gasp!). Sometimes, though, it’s been written poorly. If the person is still with the company, I can just ask about their intentions or for clarity if something is easily followed. The worst case is when the code is written poorly and by someone who is no longer with the company. Now I have code that is hard to understand, the person that wrote it is gone, and I’m being asked to either fix or implement a new feature utilizing pieces of this existing code.

As I dig further in to understand what’s happened before me, I realize that there are a multitude of issues with the existing code. It didn’t account for this case or that business rule that it was supposed to. It’s duplicating data in two tables or it’s written in an unintelligible way in order to be “fancy”. I like fancy code as much as the next developer, but more often than not, simplicity is best. Me: 0. Technical Debt: 1.

This brings me to the all-important question: Refactor or hack? Should I take the time to refactor the existing code, clean it up, and make it easier for the next person that comes along or should I hack at the existing code to deliver the feature or bug fix on time and on budget? It’s difficult for a developer to answer this question because most of us want to do a good job and create the best possible code base even if it takes longer. We take pride in our work and genuinely want to do a good job. Often the pressure from the business side reveals that they don’t care how well the code works under the covers. They just want it to work and work today.

I’m fortunate to have a great business team that understands the long game and genuinely wants an easily maintainable code base, but I still struggle with “how long has this story been kicked down the sprint road because of other broken places in the code?” I don’t have an answer for this question at the moment. It’s just a thought that’s been tumbling around in my mind as I’ve added at least three stories to refactor large portions of code in an effort to simplify and make go-forward maintenance easier.

App Store Reviews

Maybe it’s just because I’m a software developer, but it just about makes me cry when I see great apps with terrible reviews simply because the owners that own the app are trying to make a living. If you don’t like how much someone is charging for something at a restaurant, the proper response is to get something cheap and get out or don’t eat there. Those are your options. You don’t give it a one star review in Yelp for its pricing alone, do you?

If you download a freemium app, do yourself a favor and “read the menu”. It’s that little section down at the bottom of the app page that tells you what In-App purchases there are. If you don’t like those prices, find a different app.

App Store reviews should be for telling the developers and the rest of the world that the app works really or doesn’t. An app that performs really well that costs a lot shouldn’t be penalized for the owner’s decision to charge whatever they feel is fair. Find another medium to express your dissatisfaction with the pricing model. If the owner wants to put himself out of business by charging too much, that’s his prerogative. He or she will adjust based on simple supply and demand. Remember economics 101?

Why I Love WealthFront

In the past I’ve been a TastyTrader. While I whole-heartedly agree with and would continue to trade this way given different circumstances, my account is simply not large enough to get ahead of the ridiculously cheap fees. When most online brokers charge at least $5 per trade, TD Ameritrade has graciously provide fees at $1.50 per contract. For a typical vertical spread this means a total of $6. $3 to open the position, and $3 to exit the position. Not too bad as it’s about half if not more than what everyone else is charging. The trouble is that with a “tasty bite” sized account, you just can’t get ahead. If a position go against you, then you lose money. If a position goes for you, you’re basically making peanuts on the dollar as each $15 win actually amounts to about $8.5. Additionally with a tasty bite account, you’re limited in capital. So not only do you make very little, that very little can only be made every so often because you’re limited to how many positions you can open. You can’t open 30 positions that tie up $400 of your capital unless you have enough capital to cover yourself. Even if you can open enough positions, you don’t get $8.5 all up front. You might have to wait many days or weeks if it’s a winning trade.

That said, with a bigger account1, it’s an unbelievably methodical and profitable way to trade options. If you can remove the emotion from it and not treat it like gambling (which can be very easy to do when you get into the statistics of all it), then it’s a winning strategy to stay small and make calculated decisions that will grow your money.

Which brings me to why I love WealthFront. Use that link and you’ll get an additional $5k managed for free. With a smaller account, in my mind, this is the only way to win. Automatically rebalanced, tax-loss harvested, and low fees chargef for ETFs all speak volumes about how WealthFront is committed to the individual investor as well. Rule #1 in investing is “Don’t Lose Money”. Benjamin Graham, Warren Buffet, and their contemporaries all follow this main principal. If you lose money, then the effort your money has to exert to gain it back is far greater than simply getting a decent return. Let’s say you have $100 to invest. A 5% return on your $100 equals $105, right? Now let’s say you lose $10 out of your $100, and now you have $90. What’s the rate of return you’d have to get back to that same $105? 16.67% ! Which sucks. That’s more than triple the rate of return if you hadn’t lost any money.

So, what is an investor to do? Let some great software do all the thinking for you. I’m not saying you’ll never lose money at WealthFront or similar companies, and I’m just some guy on the internet making a case for what I use. I’m not an expert, but for my peace of mind, at this particular juncture in my life, taking a very mentally taxing set of ongoing financial decisions out of my brain is totally worth it.

Referral link if you want to give both of us an extra $5k managed for free:

Non-referral link if you don’t care:

  1. Currently, there is a Federal restriction that only allows certain types of margin and leverage for accounts that have a balance greater than $25k. 

Working with Knockout

Much of the last two weeks has been working with Knockout and Kendo. These two do not play nicely together. The application that I support has seen a lot of “churn” in terms of what technologies are being used which can be both good and bad. As a new person, it’s difficult to know what to use and when and where. The more senior developers are better able to answer the question on a case by case basis and know why you would pick one over the other. They would also know why it doesn’t make much sense to go back and convert everything…

Working with Knockout JS has been a generally positive experience. I’m still trying to grasp the entire flow from DB→POCO→JSON→Browser, but from what I can gather, there’s a bit of plumbing that wires up all the pieces and parts properly. The really nice thing about KO is the provision of a mapping plugin. Get your JSON object back and shove it into a Javascript view model to update the UI. Done.

Own Your Own Business

I’ve had this dream in my heart to be in business for myself for quite some time. For a very short period of time I was in business for myself. I had a Tax ID and everything. I did market research for a fitness product called a kettle bell. This wasn’t just any kettle bell, though. It was adjustable. At the time, there was nothing else like it being sold on Amazon. So, what does any halfway decent entrepreneur do in this situation? Validate the idea. I threw up a simple landing page, put out some Facebook ads to drive traffic to the landing page and started collecting emails. My target audience was 18-25 year olds that liked CrossFit on their profiles. I had about one million potential customers. At $150 per unit, there was potentially a profitable business at hand. After a week, my idea was validated. I purchased 50 of these things, got them through customs, onto freight trucks, and into a fulfillment center ready to ship out to customers. Through some tough lessons learned, margin per unit turned out to be about $20. This isn’t terrible if you’re able to sell dozens each month, but I just didn’t have the cash flow in order to do that. I sold all 50 that I’d ordered and watched the other larger companies in the mix lower their prices to compete and push the smaller companies (mine) out of business.

I have no regrets about this whole experience, but here’s the most valuable lesson I learned during the whole process: everyone is already in business for themselves. There are only two major categories that are sold: products or services. If you’re like me, you are a software developer and you “sell” a mix of both. Software products are sold to clients (internal and external), and services are sold in terms of ongoing maintenance and support of those products. As an individual in the business world, whether as a full-time employee, contractor, or consultant, you sell your own individual expertise and abilities to employers or clients every day. The trick is to constantly look at your job this way and as Shawn Blanc says, “show up every day”. Earn the trust and confidence of your audience whether that be your product owner, manager, or teammates. Conduct yourself on a day to day basis as if you were an individual business owner earning his salary. If you want to own your business, it starts with the mindset at your current job. When the time comes along to strike out on your own with your own business, all of these soft skills will be invaluable.

A New Project

Based on my last post, I was building out a sub-domain for some more professional posts that are full of computer nerdery. I’ve always been one to tinker, deconstruct, reconstruct, and sometimes blow up things in order to figure out how they work. My very patient wife has taught me that people are not the same as computers and other complex physical objects…

That being said, anything technical is now posting elsewhere. I have a handful of items posted already, but consider it a working portfolio of sorts. There were some programming languages and frameworks that I wanted to use and learn more about, so this is demonstration of that skill set. The top level domain here will be mostly for family related stuff going forward.


I finally got my own portfolio going. I built it with a little bit of help from some well supported projects that you can take a look at on the about page.

I’m excited to have a space that will hopefully demonstrate some of my development ability. As I’ve looked for jobs over the years, it’s one thing to say you know how to build a site or an app. It’s quite another to have built a site using some popular tools, host your own CDN files, and add SSL to all domains in the pipeline. Granted these are probably seasoned professionals, but they were new to me, and now they are a part of my technical abilities.

If you’d like a more resume-y style perspective on what I’ve done check out my career history.

The Focus Course Launch Week Case Study

Shawn Blanc on The Focus Course Launch Week Case Study:

But, to say it was an accident would discount all the work I put into marketing and list building, the years I’ve spent writing for my websites and building an audience, and the hours and hours I put into researching and crafting the contents of the course.

Just because it was a new experience doesn’t mean it was an accident. And neither does it mean it’s not repeatable.

I read Shawn’s detailed part one description of the launch of The Focus Course this past week. I’ve been wanting to create a business like this for quite some time. Learning about some of the details of he did was very interesting. He was so thoughtful and methodical. All of the things that I’ve learned from Tim Ferriss and others regarding educational courses was played out here in an amazing way. As I’m sure Shawn and Tim will agree, the money is not the point. It’s never the point. It’s about the freedom of lifestyle that is afforded.


Let’s Encrypt Nginx & AWS Cloudfront

As I learn so many different technologies, I figured it would be helpful to set up a sub domain for things not directly related to the Walsh family. In typical Stephen-like fashion, I didn’t half-ass it. It’s probably overkill, over-engineered, and way more complicated than it needs to be, but that’s why you love me. ♥️

High Level

If you don’t want to read through the more technical steps, take a look at the table below to get the high level. In a nutshell, I wanted simple for the top-level domain (i.e. WordPress), and I wanted something that I could play around with and keep some of my professional work grouped together on a sub-domain that wasn’t WordPress as a working portfolio of sorts.

Domain Location SSL’d Nginx on Digital Ocean SSL’d Nginx on Digital Ocean SSL’d S3/Cloudfront

Again for those that want to skim, here are links to each of the tutorials that I followed to get the above setup. I’m a big fan of Digital Ocean, and you should be too 🙂


  • Ubuntu 16.04 initial server setup1
  • Nginx server blocks (for the top level and sub domains on Digital Ocean)2
  • SSL Encryption with Let’s Encrypt for Nginx3
  • S3 Static Site CloudFront CDN4
  • Let’s Encrypt S3/CloudFront CDN5
  • MySQL backup to S36

Now, here are the specifics of how I set things up. I hope this is beneficial in some way to others out there that want to run a secure, “light-weight” infrastructure, that costs less than $15/month. I’m assuming that you know how to get around comfortably on the command line, know how to make some basic DNS adjustments when needed, and have a “can-do” attitude because you’ll more than likely enter something incorrectly like I did and have to back-track. Get comfortable with snap-shotting your server so you can backup without completely destroying all of your work.

Ubuntu 16.04 initial server setup

I’ve used Ubuntu for years. I’ve tried other stuff. It just seems to keep trucking along with no signs of stopping. There is nothing real fancy in this tutorial that was extra special to my setup.

Nginx server blocks to setup a sub domain hosted on the same server

I’ve not used Nginx for WordPress up until recently. I’ve been happy with how easy it is to setup even with SSL (which we’ll get to later). Nothing real important to note here. I’ll give some more detail on the server blocks in the below section because they have SSL directives which won’t make sense out of the context of encryption.

SSL Encryption with Let’s Encrypt for Nginx

This is where things start to get a bit more custom and interesting. Let’s Encrypt has not provided any “out of the box” functionality for Nginx. It’s not wholly unsupported, but it does require a bit of know how. First, this tutorial is going to ask you to install Let’s Encrypt manually via a Git package. This is not necessary. Simply run the apt-get command. If you have a sudo user setup (which you should!), then this will run without a hitch.

sudo apt-get install letsencrypt

Running from the package manager makes running some of the other commands here quite a bit easier, instead of:

cd /opt/letsencrypt

You just get do:

sudo letsencrypt --foobar command

When you get to the point of actually wanting to generate your certs, you run this:

sudo letsencrypt certonly --webroot \
-w /var/www/ -d -d \
-w /var/www/ -d

You’ll notice I didn’t include the S3/Cloudfront. There’s a reason for that which we’ll get to shortly. Now for some server blocks. If you followed the guide above, you’ll have three sites in /etc/nginx/sites-available. Now for their server blocks.

Default server block

server {
        listen 80 default_server;
        listen [::]:80 default_server;

        root /var/www/html;

        # Add index.php to the list if you are using PHP
        index index.php index.html index.htm index.nginx-debian.html;

        server_name _;      

        # other configuration below

Top level domain server blocks

server {
        listen 80;
        listen [::]:80;
        return 301 https://$server_name$request_uri; # NOTE this line. It may have to be commented out, then commented in after the S3/CloudFront configuration

server {
        # SSL configuration

        listen 443 ssl http2 default_server;
        listen [::]:443 ssl http2 default_server;
        include snippets/;
        include snippets/ssl-params.conf;

        root /var/www/;

        # Add index.php to the list if you are using PHP
        index index.php index.html index.htm index.nginx-debian.html;


        # other configuration below

Sub domain server blocks

server {
        listen 80;
        listen [::]:80;
        return 301 https://$server_name$request_uri;

server {
        # SSL configuration

        listen 443 ssl http2;
        listen [::]:443 ssl http2;
        include snippets/;  # NOTE that this is the same file as the top level domain based on the tutorial
        include snippets/ssl-params.conf;

        root /var/www/;

        # Add index.php to the list if you are using PHP
        index index.php index.html index.htm index.nginx-debian.html;


        # other configuration below

Make sure you point your top level and sub domain server blocks to the same snippets for and ssl-params.conf. Note also that you have to comment out the 301 redirect for your top level if the S3/CloudFront configuration doesn’t work as expected. This line reroutes traffic from a standard http:// request to the https:// endpoint which doesn’t yet exist for the S3/CloudFront sub domain.

Check your work

Can you get to both domains with an encrypted connection? If you followed the server block tutorial, you should have some test index.html files to validate that your domain and sub domain are routing and working properly with SSL. Try it with http:// to make sure it’s rerouting. If so take a snapshot of your VPS. I took about 5-7 snapshots at various points throughout this process in case I messed something up.

S3 Static Site CloudFront CDN

Setting up a static site was pretty straightforward. Just be mindful that I am not using Amazon Route 53 for DNS, so I skipped those steps in this tutorial. I did a standard CNAME pointer from my sub domain to the CloudFront given domain name. Make sure you can get the CloudFront provided URL before moving forward. It may take 15-20 minutes to provision everything and be ready for traffic. Remember that you are creating a bucket for your sub domain and title it appropriately. In my case this was Since I’m not using a top level domain and www style domain in S3, I had to adjust the tutorial to suit my needs.

Let’s Encrypt S3/CloudFront CDN

This tutorial was a great help, but I piece-mealed from some other sites as well. The first thing you’ll want to do is install the AWS CLI. This will require you to install python-pip from apt-get if you’re using Ubuntu. While you’re waiting on that, go set up a new IAM user on AWS and give it an appropriate policy to upload certificates.

To recap, we have the AWS CLI installed and we have an IAM user ready to send a not yet generated certificate to our AWS CloudFront. Still with me? If you haven’t already, take a snap shot before we start working on this next section.

First, you should already have a terminal open from which you’ve been running all of these other commands. Open a second one. This is important. When you run the next letsencrypt command it’s going to validate a file in your CloudFront. You must place that file there with the AWS CLI prior to hitting Enter on the first terminal window. We’ll generate that file in just a bit. Ready?

 sudo letsencrypt certonly --manual

This is going to give you a prompt for your CloudFront sub domain (i.e. Remember when we didn’t generate a certificate for this domain earlier? We did that because wanted to run this manually. It’s special. Follow the prompts and you’ll get something that looks like this:

Make sure your web server displays the following content at
http://your-site.whatever/.well-known/acme-challenge/some_long_path before continuing:


Content-Type header MUST be set to text/plain.

... <snip> ...
Press ENTER to continue

Notice it says, “Press ENTER to continue”. Don’t do that yet. We have to copy the acme-challenge file up to your S3 bucket first. If you ran the `aws configure’ command with your new IAM role, great. If not, go ahead and run this in a separate terminal window:

aws configure

It’s going to prompt you for your AWS Access Key ID, AWS Secret Access Key, and your Default region name. You should enter the default region for your S3 bucket. When you’ve configured this correctly, you can view your credentials and config files in ~/.aws just to make sure they are correct.

Now we’re ready to put the acme-challenge file into our S3 bucket. Store the some_long_string file in a temp file first ensuring that you’ve replaced some_long_string with the long string from your first terminal window.

printf "%s" some_long_string > /tmp/acme-challenge

Then upload the verification file to your S3 bucket ensuring that you’ve replaced some_long_path with the long path from your first terminal window.

aws s3 cp \
/tmp/acme-challenge \
s3://your_s3_bucket_name/.well-known/acme-challenge/some_long_path \
--content-type text/plain

Sanity check that the file is there.

curl -D - http://your-site.whatever/.well-known/acme-challenge/some_long_path

I had a bit of trouble with this. I was able to successfully upload the file to my S3 bucket, but for some reason I couldn’t get to it with my sub domain address. Remember that line that we noted on our top level domain server block? Try commenting that out and restarting Nginx. You can also set each level of that URL in your S3 bucket to public by clicking the checkbox, then going to actions and selecting “Make Public”. Do this starting with .well-known, acme-challenge, and the actual some_long_path file itself. Try loading the file up in a private browser section with no caches until it works. Then run the curl command above. When you’re able to view that file, then you can press enter on your first terminal window. If you get a “Self-verify of challenge failed.” error from Let’s Encrypt, it’s more than likely because it can’t get to that file. Read the description of the error and troubleshoot as necessary. It’s a pretty detailed log of what happened.

Assuming that you’ve passed the self verify, you should get a message like Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/your-site.whatever/fullchain.pem. Now you can upload your certificate for use in CloudFront. It took some trial and error, but the following worked for me:

sudo aws iam upload-server-certificate \
--server-certificate-name your-site.whatever \
--certificate-body file:///etc/letsencrypt/live/your-site.whatever/cert.pem \
--private-key file:///etc/letsencrypt/live/your-site.whatever/privkey.pem \
--certificate-chain file:///etc/letsencrypt/live/your-site.whatever/chain.pem \
--path /cloudfront/

Obviously you’ll want to make sure that the your-site.whatever directory is where your certificates are stored. Also mind the forward slashes and the third / in the file:/// directive. My certs are stored in /etc/letsencrypt, so I needed that third one to tell the AWS CLI where it was supposed to start looking for the file. If it works you’ll get a confirmation. Now head on over to CloudFront and select the proper certificate that you just uploaded under the “Distribution Settings” and complete the remainder of Nathan Parry’s tutorial for Step 4.

If everything is working, take a snap shot. 📸

MySQL backup to S3

Home stretch! Once you’ve got all of these pieces in place, you can finish up the WordPress installation if that’s what you’re using. If not, you’re free to go. 🏃 If you are using WordPress, let’s backup up that precious MySQL database to S3 as well. Go create another IAM user, and give it AmazonS3FullAccess. I created a separate group for S3 access so I could reuse that group later if needed. Make sure you run s3cmd --configure before creating the bash script and running it. S3CMD is going to use your other IAM user. In that bash script you’ll need to specify S3_BUNDLE. This is a bucket name. I created a separate bucket for this sole purpose. That way my MySQL backups are separate from my sub domain that was setup earlier. Make your bash script executable and run it. If all goes well, you should see a gunzipped file in your bucket. Set up cron task to automate your nightly or weekly backups, and you’re off to the races.


Whew! That was a lot. Here’s what we accomplished:

  1. We setup an Nginx server that hosts two domains (one top level, and one sub).
  2. We secured both domains with SSL certificates from Let’s Encrypt.
  3. We created some IAM users to upload certificates and MySQL backups.
  4. We created a static S3 bucket behind a CloudFront for content delivery.
  5. We secured our sub domain that points to our CloudFront CDN with an SSL certificate from Let’s Encrypt.
  6. We automated certificate renewal and MySQL backups with cron tasks.

This seems like a lot of work, but securing your server and sub-domains is a good practice to get in. Let me know if there’s anything I missed or need to correct in the comments.