20 random bookmarks

2025-09-29

135.

stupid jj tricks

andre.arko.net/2025/09/28/stupid-jj-tricks

Welcome to “stupid jj tricks”. Today, I’ll be taking you on a tour through many different jj configurations that I have collected while scouring the internet. Some of what I’ll show is original research or construction created by me personally, but a lot of these things are sourced from blog post, gists, GitHub issues, Reddit posts, Discord messages, and more.

2025-06-26

123.

Box combinators

mmapped.blog/posts/41-box-combinators.html

In functional programming,
combinator libraries refer to a design style that emphasizes bottom-up program construction.
Such libraries define a few core data types
and provide constructors—functions that create initial objects—and combinators—functions that build larger objects from smaller pieces.

Combinators enable the programmer to use intuitive visual and spatial reasoning
that’s vastly more powerful than linear language processing.
As a result, solving problems with combinators feels like playing with lego pieces.

2025-05-28

113.

The Ingredients of a Productive Monorepo

blog.swgillespie.me/posts/monorepo-ingredients

2025-05-23

111.

share_target - Web application manifest

developer.mozilla.org/en-US/docs/Web/Progressive_web_apps/Manifest/Reference/share_target

The share_target manifest member allows installed Progressive Web Apps (PWAs) to be registered as a share target in the system's share dialog.

2024-12-20

94.

Visitor Pattern Considered Pointless - Use Pattern Switches Instead

nipafx.dev/java-visitor-pattern-pointless

In modern Java, the visitor pattern is no longer needed. Using sealed types and switches with pattern matching achieves the same goals with less code and less complexity.

2024-11-22

89.

New stuff in Emacs 30

www.mgmarlow.com/words/2024-07-28-emacs-30-news

Reading through the Emacs 30 NEWS file and picking
out the stuff I think is the most interesting.

2024-11-04

86.

Writing secure Go code

jarosz.dev/article/writing-secure-go-code

Security testing starts with understanding vulnerabilities. The CVE website lists known software flaws. The OWASP Top Ten highlights common weaknesses. With this knowledge, we can improve our Go development. This article shows how to put in place robust practices. They are to: fuzz inputs, verify dependencies, and use static analysis tools (SAST).

2024-09-30

79.

On Leaving Apple

typesanitizer.com/blog/leaving-apple.html

2024-09-25

78.

in which interactive development saves the day

technomancy.us/189

2024-08-14

65.

A Flexible Minimalist Neovim for 2024

wickstrom.tech/2024-08-12-a-flexible-minimalist-neovim.html

2024-07-05

60.

JavaScript-Free Sidenotes in Hugo

danilafe.com/blog/sidenotes

2024-06-20

46.

Why does SQLite (in production) have such a bad rep?

avi.im/blag/2024/sqlite-bad-rep

2024-06-14

29.

pounce - IRC bouncer

git.causal.agency/pounce/about
Reposted 28.

interstar/cardigan-bay: A new wiki engine in Clojure ...

github.com/interstar/cardigan-bay

A single-user “wiki” engine powering the ThoughtStorms wiki.

2024-06-13

27.

Category Theory for Programmers: The Preface

bartoszmilewski.com/2014/10/28/category-theory-for-programmers-the-preface
23.

Macaroons Escalated Quickly

fly.io/blog/macaroons-escalated-quickly
22.

API Tokens: A Tedious Survey

fly.io/blog/api-tokens-a-tedious-survey

Comparison between types of API tokens.

20.

My personal C coding style as of late 2023

nullprogram.com/blog/2023/10/08
17.

Arena allocator tips and tricks

nullprogram.com/blog/2023/09/27
16.

Avoid Linux locking up in low memory situations using earlyoom

dataswamp.org/~solene/2022-09-28-earlyoom.html

This article presents the program earlyoom to prevent a Linux system to lock up in low memory situations.