2025-09-29
stupid jj tricks
andre.arko.net/2025/09/28/stupid-jj-tricksWelcome to “stupid jj tricks”. Today, I’ll be taking you on a tour through many different jj configurations that I have collected while scouring the internet. Some of what I’ll show is original research or construction created by me personally, but a lot of these things are sourced from blog post, gists, GitHub issues, Reddit posts, Discord messages, and more.
2025-09-01
Jujutsu for everyone
jj-for-everyone.github.ioA Jujutsu tutorial that requires no previous experience with Git or other version control systems.
2025-06-13
What I talk about when I talk about IRs
bernsteinbear.com/blog/irsI have a lot of thoughts about the design of compiler intermediate representations (IRs). In this post I’m going to try and communicate some of those ideas and why I think they are important.
2025-06-12
Always do Extra
www.bennorthrop.com/Essays/2021/always-do-extra.phpExtra is different than More. Extra is finishing those two screens, but then researching a new library for form validation that might reduce the boilerplate code. Or it's learning ways to protect against common security vulnerabilities from data entry. These little off-ramps from the main highway of Normal Work could be dead-ends and not have any practical value to the project. But they might also be important contributions. And that's the thing with Extra. While the tangible value to the project is uncertain (it could be nothing this time or it could be something), the value to you is real.
2025-05-23
share_target - Web application manifest
developer.mozilla.org/en-US/docs/Web/Progressive_web_apps/Manifest/Reference/share_targetThe share_target manifest member allows installed Progressive Web Apps (PWAs) to be registered as a share target in the system's share dialog.
2025-05-15
Speculation in JavaScriptCore
webkit.org/blog/10308/speculation-in-javascriptcoreThis post is all about speculative compilation, or just speculation for short, in the context of the JavaScriptCore virtual machine.
2025-05-06
Debian installation with encrypted BTRFS
chaos.tomaskral.eu/guides/debian-encrypted-btrfs-root2025-04-04
Pitfalls of Safe Rus
corrode.dev/blog/pitfalls-of-safe-rustWhen people say Rust is a “safe language”, they often mean memory safety.
And while memory safety is a great start, it’s far from all it takes to build robust applications.
Memory safety is important but not sufficient for overall r…
2025-03-13
Building interactive web pages with Guile Hoot
spritely.institute/news/building-interactive-web-pages-with-guile-hoot.html2024-09-16
Technical Writing One introduction
developers.google.com/tech-writing/one2024-07-15
"GitHub" Is Starting to Feel Like Legacy Software
mistys-internet.website/blog/blog/2024/07/12/github-is-starting-to-feel-like-legacy-softwareI’ve used a lot of tools over the years, which means I’ve seen a lot of tools hit a plateau. That’s not always a problem; sometimes …
2024-06-26
A reckless introduction to Hindley-Milner type inference
reasonableapproximation.net/2019/05/05/hindley-milner.html2024-06-24
Counting Immutable Beans: Reference Counting Optimized for Purely Functional Programming
arxiv.org/abs/1908.05647Most functional languages rely on some garbage collection for automatic memory management. They usually eschew reference counting in favor of a tracing garbage collector, which has less bookkeeping overhead at runtime. On the other hand, having an exact reference count of each value can enable optimizations, such as destructive updates. We explore these optimization opportunities in the context of an eager, purely functional programming language. We propose a new mechanism for efficiently reclaiming memory used by nonshared values, reducing stress on the global memory allocator. We describe an approach for minimizing the number of reference counts updates using borrowed references and a heuristic for automatically inferring borrow annotations. We implemented all these techniques in a new compiler for an eager and purely functional programming language with support for multi-threading. Our preliminary experimental results demonstrate our approach is competitive and often outperforms state-of-the-art compilers.
Deriving Dependently-Typed OOP from First Principles -- Extended Version with Additional Appendices
arxiv.org/abs/2403.06707The expression problem describes how most types can easily be extended with new ways to produce the type or new ways to consume the type, but not both. When abstract syntax trees are defined as an algebraic data type, for example, they can easily be extended with new consumers, such as print or eval, but adding a new constructor requires the modification of all existing pattern matches. The expression problem is one way to elucidate the difference between functional or data-oriented programs (easily extendable by new consumers) and object-oriented programs (easily extendable by new producers). This difference between programs which are extensible by new producers or new consumers also exists for dependently typed programming, but with one core difference: Dependently-typed programming almost exclusively follows the functional programming model and not the object-oriented model, which leaves an interesting space in the programming language landscape unexplored. In this paper, we explore the field of dependently-typed object-oriented programming by deriving it from first principles using the principle of duality. That is, we do not extend an existing object-oriented formalism with dependent types in an ad-hoc fashion, but instead start from a familiar data-oriented language and derive its dual fragment by the systematic use of defunctionalization and refunctionalization. Our central contribution is a dependently typed calculus which contains two dual language fragments. We provide type- and semantics-preserving transformations between these two language fragments: defunctionalization and refunctionalization. We have implemented this language and these transformations and use this implementation to explain the various ways in which constructions in dependently typed programming can be explained as special instances of the phenomenon of duality.
2024-06-20
Go's 'range over function' iterators and avoiding iteration errors
utcc.utoronto.ca/~cks/space/blog/programming/GoIteratorsAndAvoidingMistakes2024-06-14
Nix as a WebAssembly build tool
determinate.systems/posts/nix-wasmCAUSAL.AGENCY(7)
causal.agencyI make mostly IRC software in C. I like OpenBSD but also the GPL. I just want to read books and try to learn to be kinder. When I can I'd like to talk to strangers and experience more magic.
2024-06-13
An easy-to-implement, arena-friendly hash map
nullprogram.com/blog/2023/09/30Arena allocator tips and tricks
nullprogram.com/blog/2023/09/272024-06-11
NetBSD 10 on a Pinebook Pro laptop
www.idatum.net/netbsd-10-on-a-pinebook-pro-laptop.htmlI've been running NetBSD on a RockPro64 since NetBSD 10-BETA, and I'm still happy with it now with NetBSD 10-RELEASE. I'm always looking for hardware to hack NetBSD though, and I recently watched a FOSDEM 2024 video: NetBSD 10: Thirty years, still going strong!. The Pinebook Pro laptop was mentioned at one point, which has the same RockChip SoC as the RockPro64. That reminded me I'd been wanting to give this inexpensive ARM 64 laptop a try.