Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

I trust you all to play fair and square, but let’s let the computer decide when the game has been won to be safe.

Shortcodes in WordPress can be very powerful, but there is one fundamental thing about them that isn’t so great – they keep their data relatively ina…

I’m Dave, thank you for popping by..

Peter Braden Links Photography Code Recent Contact About

These functions are used to determine if a user can impersonate others, can be impersonated by others and if the user is currently impersonating.

Get in touch if you'd like to build something together.

I’m Jack, a software engineer with over ten years' experience; passionate about building digital experiences that work for everyone.

And with so much of the ceremony taken care of it feels like writing a function but in a Ruby wrapping.

Through these representations, users can retrieve, update and delete data, and these methods are used to maintain the state of the application.

View previous queries