Jess Bees
software engineer
Jess is a software engineer and artist with experience developing server and client web applications. Their present interests include teaching tech literacy and exploring WebAssembly.
- Ruby, Ruby on Rails
- JavaScript, Node, Express
- Rust
- React, React Native
- CSS, Sass
- SQL, Postgres
- nginx
- WebAssembly
Technologies
- Web app & API development
(backend, frontend, styling, db, caching layers) - Webpage performance tuning
- Deployments and monitoring
- Pink-on-black color schemes, apparently
Skills
HuffPost • Sr. Software Engineer, Architect
Live Election Results Dashboard
Created a static app to serve live polling results for the night of the 2018 U.S. midterm elections. This was white-labeled and used across Oath's (now Verizon Media Group) news properties.
HuffPost Android App
Co-architected HuffPost's first React Native application for Android.
Editorial CMS
Architected, developed, and maintained custom internal CMSs for curating content, using Ruby on Rails and React.
HuffPost Website
Co-architected HuffPost's (then The Huffington Post) first dedicated mobile website, and later its desktop site and mobile APIs. Handled redesigns, deployments, site performance, and reliability for 5+ years.
Open Source
Maintainer: lab
A Rust library for working with and converting CIE L*a*b* color values.
Author: openni2
A Rust library for using the OpenNI2 library and PrimeSense devices.
Author: engiffen
A Rust binary for creating animated gifs from a list or directory of images.
Speaking
Gluing The Web And WebAssembly Together
This a technical talk that describes how to add convenience code that makes running WebAssembly easier. wasm-bindgen
and emscripten
generate convenient glue code automagically, and this talk goes into detail about what problems they solve, and how to solve them manually.
Ads Are Evil, But I'm Worse
This presentation describes a mysterious ad which I discovered after it tried to cover its tracks a little too conspicuously. I describe how JavaScript can be used to conclusively determine if a browser's JS console is open, and then I explain how to proactively guard against the technique.