Explore
Borrow checking, RC, GC, and the Eleven (!) Other Memory Safety Approaches
A fellow named Zeke came into my server one day. Zeke: "Wait, so with generational references,...
Who are your favorite tech youtubers | Lobsters
Hello, Out of curiosity, who are your favorite tech youtubers. Since I love to learn a...
Spritely Goblins v0.13.0: Object Persistence and Easier IO! -- Spritely Institute
Christine Lemmer-Webber -- Tue 23 April 2024We are thrilled to announce the release of our distributed...
Good essays on application vs library programming? | Lobsters
I always hear from people that the practices and techniques you use to make a software...
The only two log levels you need are INFO and ERROR | nicole@web
Logging is a critical tool for maintaining any web application, and yet we're getting it wrong....
What are you doing this week? | Lobsters
What are you doing this week? Feel free to share! Keep in mind it’s OK to...
3 important things I overlooked during code reviews | Piglei
Code review is a popular practice in software development. By incorporating human reviews before merging code...
What are you doing this weekend? | Lobsters
Feel free to tell what you plan on doing this weekend and even ask for help...
XZ/LZMA Worked Example Part 1: Range Coding
This blog post is one of a five part series. Background XZ is a general purpose...
What are you doing this week? | Lobsters
What are you doing this week? Feel free to share! Keep in mind it’s OK to...
Elegance: The Undervalued System Requirement - Systems Approach
Our last newsletter on our shifting perspective on blockchains forced us to ask the question: what...
Subset Park: Combinatory Programming
2024-04-06To The ProgrammerA combinator is a kind of function. Specifically, it’s a function that applies its...