Blog 2: Reference Checking Hacks