2025-09-29
stupid jj tricks
andre.arko.net/2025/09/28/stupid-jj-tricksWelcome to “stupid jj tricks”. Today, I’ll be taking you on a tour through many different jj configurations that I have collected while scouring the internet. Some of what I’ll show is original research or construction created by me personally, but a lot of these things are sourced from blog post, gists, GitHub issues, Reddit posts, Discord messages, and more.
2025-06-26
Box combinators
mmapped.blog/posts/41-box-combinators.htmlIn functional programming,
combinator libraries refer to a design style that emphasizes bottom-up program construction.
Such libraries define a few core data types
and provide constructors—functions that create initial objects—and combinators—functions that build larger objects from smaller pieces.Combinators enable the programmer to use intuitive visual and spatial reasoning
that’s vastly more powerful than linear language processing.
As a result, solving problems with combinators feels like playing with lego pieces.
2025-05-28
The Ingredients of a Productive Monorepo
blog.swgillespie.me/posts/monorepo-ingredients2025-05-23
share_target - Web application manifest
developer.mozilla.org/en-US/docs/Web/Progressive_web_apps/Manifest/Reference/share_targetThe share_target manifest member allows installed Progressive Web Apps (PWAs) to be registered as a share target in the system's share dialog.
2024-12-20
Visitor Pattern Considered Pointless - Use Pattern Switches Instead
nipafx.dev/java-visitor-pattern-pointlessIn modern Java, the visitor pattern is no longer needed. Using sealed types and switches with pattern matching achieves the same goals with less code and less complexity.
2024-11-22
New stuff in Emacs 30
www.mgmarlow.com/words/2024-07-28-emacs-30-newsReading through the Emacs 30 NEWS file and picking
out the stuff I think is the most interesting.
2024-11-04
Writing secure Go code
jarosz.dev/article/writing-secure-go-codeSecurity testing starts with understanding vulnerabilities. The CVE website lists known software flaws. The OWASP Top Ten highlights common weaknesses. With this knowledge, we can improve our Go development. This article shows how to put in place robust practices. They are to: fuzz inputs, verify dependencies, and use static analysis tools (SAST).
2024-09-30
On Leaving Apple
typesanitizer.com/blog/leaving-apple.html2024-09-25
in which interactive development saves the day
technomancy.us/1892024-08-14
A Flexible Minimalist Neovim for 2024
wickstrom.tech/2024-08-12-a-flexible-minimalist-neovim.html2024-07-05
JavaScript-Free Sidenotes in Hugo
danilafe.com/blog/sidenotes2024-06-20
Why does SQLite (in production) have such a bad rep?
avi.im/blag/2024/sqlite-bad-rep2024-06-14
pounce - IRC bouncer
git.causal.agency/pounce/aboutinterstar/cardigan-bay: A new wiki engine in Clojure ...
github.com/interstar/cardigan-bayA single-user “wiki” engine powering the ThoughtStorms wiki.
2024-06-13
Category Theory for Programmers: The Preface
bartoszmilewski.com/2014/10/28/category-theory-for-programmers-the-prefaceMacaroons Escalated Quickly
fly.io/blog/macaroons-escalated-quicklyAPI Tokens: A Tedious Survey
fly.io/blog/api-tokens-a-tedious-surveyComparison between types of API tokens.
My personal C coding style as of late 2023
nullprogram.com/blog/2023/10/08Arena allocator tips and tricks
nullprogram.com/blog/2023/09/27Avoid Linux locking up in low memory situations using earlyoom
dataswamp.org/~solene/2022-09-28-earlyoom.htmlThis article presents the program earlyoom to prevent a Linux system to lock up in low memory situations.