too many bees

Jess Bees

software engineer

[ This résumé was generated on , and is kept updated at ]

Jess is a software engineer and artist with experience developing server and client web applications. Their present interests include teaching tech literacy and exploring WebAssembly.


  • Ruby, Ruby on Rails
  • JavaScript, Node, Express
  • Rust
  • React, React Native
  • CSS, Sass
  • SQL, Postgres
  • nginx
  • WebAssembly


  • Web app & API development
    (backend, frontend, styling, db, caching layers)
  • Webpage performance tuning
  • Deployments and monitoring
  • Pink-on-black color schemes, apparently
- Present

HuffPost • Sr. Software Engineer, Architect

Live Election Results Dashboard

Created a static app to serve live polling results for the night of the 2018 U.S. midterm elections. This was white-labeled and used across Oath's (now Verizon Media Group) news properties.

HuffPost Android App

Co-architected HuffPost's first React Native application for Android.

Editorial CMS

Architected, developed, and maintained custom internal CMSs for curating content, using Ruby on Rails and React.

HuffPost Website

Co-architected HuffPost's (then The Huffington Post) first dedicated mobile website, and later its desktop site and mobile APIs. Handled redesigns, deployments, site performance, and reliability for 5+ years.

Open Source

Maintainer: lab

A Rust library for working with and converting CIE L*a*b* color values.

Author: openni2

A Rust library for using the OpenNI2 library and PrimeSense devices.

Author: engiffen

A Rust binary for creating animated gifs from a list or directory of images.


Brooklyn JS

Gluing The Web And WebAssembly Together

This a technical talk that describes how to add convenience code that makes running WebAssembly easier. wasm-bindgen and emscripten generate convenient glue code automagically, and this talk goes into detail about what problems they solve, and how to solve them manually.

Queens JS

Ads Are Evil, But I'm Worse

This presentation describes a mysterious ad which I discovered after it tried to cover its tracks a little too conspicuously. I describe how JavaScript can be used to conclusively determine if a browser's JS console is open, and then I explain how to proactively guard against the technique.