The Central Hub of Toad Knowledge

Javascript: Understanding Objects vs Arrays and When to Use Them. [Part 1]

What are Objects and how do they differ from Arrays in Javascript? When is it advantageous to use one over the other? I ran into this question several times while browsing through stackoverflow's javascript queue so I decided to recycle my answers, elaborate a bit and make it into a blog post. If you are new to javascript, understanding these two data types is very important and could potentially save you some headache down the road. Declaration & Augmentation
By Slavko Pesic, Development Team Lead

Metal Toad Templates Part 4: Our Project Timeline Template

Up today is a brief post to share our project timeline template. This one gets used primarily in waterfall-ish projects as a Gannt chart type of visual calendar when something as simple as a list of dates doesn't properly communicate project duration and important milestones. First up, pull up the project timeline template in your browser so you can follow along with what exactly I'm talking about.
By Adam Edgerton, Director of Project Management & Operations

AWS NAS Test Part 2

Shortly after I wrote AWS NAS Test I was contacted by Zadara Storage. They had some concerns about the data I reported from my test.
By Nathan Wilkerson, Cloud Engineer

Please don't abuse node references! Part 1

Welcome to the first part of a two part article on a terrible way to use node references, how it was fixed, and the troubles implementing the solution. In this post, I'll provide some background on the problem encountered and talk briefly about the proposed solution.
By Chris Svajlenka, Development Team Lead

AWS NAS Test

As part of Metal Toad’s Managed Services Team, I have worked extensively in custom cloud based solutions. There is no doubt Amazon Web Services (AWS) leads the pack in Cloud hosting, but when it comes to a Network Attached Storage (NAS) solution, I have found a shortfall...a fast solution. Simple Storage Service (S3) is AWS’s file solution to NAS, and it is a great system, but without refactoring our code to serve the images directly from S3, we are left with using the S3 Fuse Driver which…
By Nathan Wilkerson, Cloud Engineer

Pond Life Ep.3

Welcome once more to the pond! Last week we touched on SASS and it's importance to the developer workflow. We also walked through an introduction of Drush and Capistrano. Both of those tools are key environment tools for anyDrupal/PHP configuration.
By Jason Rodriguez, Junior Developer

What I Learned Having Lunch with My First Grader

My wife and I decided because Lucas worked so hard on his fall school play "The Garden Show" in which Lucas played the Alien Grandfather, we would take lunch to him at school. What we did not expect is that we would be having lunch with the whole class. OK so we knew that they would be there, however we did not know we would be recruited to help manage lunch time! Not by the staff, but by the children.
By Tim Winner, Senior Vice President

A Toad at TEDx Portland

This past Saturday I had the pleasure of attending Portland’s fourth TEDx event at the Keller Auditorium. Known as “ideas worth spreading,” TED stands for Technology, Entertainment and Design. The x represents a TED event that is licensed through TED but organized through local channels alone. Hooray for the over 50 volunteers and community partners that sponsor and help put this event together!
By Corinna Gelster-Borgardt, Creative Director

ToadCast 022 - Open Source and Cover Oregon

Toadcast 22 hosted an All-Star cast including: Dave Bellous, co-owner of Yellow Pencil, Jacob Redding, Open Source Manager at Accenture's Emerging Technology Innovation Labs, Jeff Walpole, CEO of Phase2, and Joaquin Lippincott, President of Metal Toad Media to discuss Open Source, Oracle, and and the healthcare web-tech industry (Cover Oregon).
By Steve Winters, Cloud Services Manager

We Are Providing Time for all of Our Employees to Change Their Passwords - Your Company Should Too.

With the highly publicized Heartbleed vulnerability this week, a vulnerability in the core of internet security has been exposed. While the vulnerability hasn't been widely known, it has existing in perhaps 2/3 of the internet for more than a year, meaning any passwords that have been used during that time are likely compromised.
By Joaquin Lippincott, President & Founder