2025-09-04
Beacon API
developer.mozilla.org/en-US/docs/Web/API/Beacon_APIThe Beacon API is used to send an asynchronous and non-blocking request to a web server. The request does not expect a response. Unlike requests made using XMLHttpRequest or the Fetch API, the browser guarantees to initiate beacon requests before the page is unloaded and to run them to completion.
2025-06-12
Always do Extra
www.bennorthrop.com/Essays/2021/always-do-extra.phpExtra is different than More. Extra is finishing those two screens, but then researching a new library for form validation that might reduce the boilerplate code. Or it's learning ways to protect against common security vulnerabilities from data entry. These little off-ramps from the main highway of Normal Work could be dead-ends and not have any practical value to the project. But they might also be important contributions. And that's the thing with Extra. While the tangible value to the project is uncertain (it could be nothing this time or it could be something), the value to you is real.
2025-05-28
The Ingredients of a Productive Monorepo
blog.swgillespie.me/posts/monorepo-ingredients2025-05-23
honk
humungus.tedunangst.com/r/honk
Take control of your honks and join the federation.
An ActivityPub server with minimal setup and support costs.
Spend more time using the software and less time operating it.
2024-12-20
Visitor Pattern Considered Pointless - Use Pattern Switches Instead
nipafx.dev/java-visitor-pattern-pointlessIn modern Java, the visitor pattern is no longer needed. Using sealed types and switches with pattern matching achieves the same goals with less code and less complexity.
2024-12-17
Advent of Code on the Nintendo DS
sailor.li/aocnds.htmlSolving AoC on the DS with Rust.
2024-11-04
Writing secure Go code
jarosz.dev/article/writing-secure-go-codeSecurity testing starts with understanding vulnerabilities. The CVE website lists known software flaws. The OWASP Top Ten highlights common weaknesses. With this knowledge, we can improve our Go development. This article shows how to put in place robust practices. They are to: fuzz inputs, verify dependencies, and use static analysis tools (SAST).
2024-10-16
Damas-Hindley-Milner inference two ways
bernsteinbear.com/blog/type-inference2024-09-25
in which interactive development saves the day
technomancy.us/1892024-09-16
Technical Writing One introduction
developers.google.com/tech-writing/one2024-09-10
run freebsd in qemu on linux
sethops1.net/post/run-freebsd-in-qemu-on-linux2024-07-15
"GitHub" Is Starting to Feel Like Legacy Software
mistys-internet.website/blog/blog/2024/07/12/github-is-starting-to-feel-like-legacy-softwareI’ve used a lot of tools over the years, which means I’ve seen a lot of tools hit a plateau. That’s not always a problem; sometimes …
2024-06-20
Go's 'range over function' iterators and avoiding iteration errors
utcc.utoronto.ca/~cks/space/blog/programming/GoIteratorsAndAvoidingMistakes2024-06-18
Comparing Objective Caml and Standard ML
adam.chlipala.net/mlcomp2024-06-14
pounce - IRC bouncer
git.causal.agency/pounce/about2024-06-13
The magic of dependency resolution
ochagavia.nl/blog/the-magic-of-dependency-resolutionAPI Tokens: A Tedious Survey
fly.io/blog/api-tokens-a-tedious-surveyComparison between types of API tokens.
2024-06-11
Optimizing Font Files for the Modern Web
documentation.platformos.com/best-practices/performance/optimizing-font-filesSelf-serve dashboards
briefer.cloud/blog/posts/self-serve-bi-mythSales pitches are the only place where “self-serve dashboards" work. In the real world, it's a different story.
Why "business" people don't use metabase/power-bi.
2024-06-10
Modern IRC Client Protocol
modern.ircdocs.horseLiving specification of the IRC protocol. Does not include brand new behavior, just existing behavior present in IRC software and/or networks (new extensions are IRCv3's area).