Fresh on the heals of our TS Party comes this curated list of tools for getting the most out of static code analysis. This list is gloriously polyglot, so there’s probably something in there for everyone.
Not in to static analysis (or just a huge fan of lists)? Check out the sister project, Awesome Dynamic Analysis.
“GUIs are bloatware” — Terminal rules…a guide to the terminal…
In this post, I’ll walk you through everything you need to start making your terminal a complete development environment: how to edit text efficiently, configure its appearance, run and combine a myriad of programs, and dynamically create, resize and close tabs and windows.
There’s a new architecture and deployment paradigm that is gaining momentum and addresses the issues we have today by merging the best from both worlds, on-prem and SaaS.
The SaaS software delivery model has completely transformed the industry and for a good reason. It offers an amazing combination of easiness and maintainability that wasn’t possible in the past with older software delivery models. It works amazingly well when we want to deliver software like CRMs, Marketing platforms, etc.
Regardless of its success, there are still challenges with the adoption of SaaS, especially in the enterprise market where security and compliance are of great importance. Today, with the rapid growth of data-related products, the SaaS model is getting even more challenged while compliance and security are not just an enterprise concern anymore.
This post shares in more detail why we need a new paradigm and what this new model has to offer.
Programming around time is the bane of pretty much every programmer’s existence. UTC works most of the time, but still has its flaws.
Zach Holman writes on his blog:
Programming time, dates, timezones, recurring events, leap seconds… everything is pretty terrible. The common refrain in the industry is Just use UTC! Just use UTC! And that’s correct…sort of. But if you’re stuck building software that deals with time, there’s so much more to consider. It’s time…to talk about time.
Zach includes a lot of time-related puns and whole lot of wisdom about programming time.
As we gear up for the launch of Practical AI and more AI/ML/DS related news coverage, I wanted to bring to your attention to this 6-month apprenticeship (compensated) in AI research at OpenAI.
We’re now accepting applications for the next cohort of OpenAI Fellows, a program which offers a compensated 6-month apprenticeship in AI research at OpenAI. We designed this program for people who want to be an AI researcher, but do not have a formal background in the field. Applications for Fellows starting in September are open now and will close on July 8th at 12AM PST.
I love this with my whole heart. 🤤
Mint is super cool, but handing over your precious financial information to a 3rd-party is always a bit nerve-racking. Evan You’s new Node app builds a bridge between Plaid (for bank access) and Google Sheets (for data storage) so you can roll your own system.
Now you only have to trust your precious financial information to two 3rd-parties 😉. But! This is open source so at least you don’t have to trust the application code.
In total the project took a year and a half to upgrade from Rails 3.2 to Rails 5.2. Along the way we took time to clean up technical debt and improve the overall codebase while doing the upgrade. Below we’ll talk about how we upgraded Rails, lessons we learned and whether we’d do it again.
Congrats to Eileen and the team on this massive effort! Click through to read how they did it and the lessons the learned along the way.
What’s worse than an unsafe private key? An unsafe public key.
The “secure” in secure shell comes from the combination of hashing, symmetric encryption, and asymmetric encryption. Together, SSH uses cryptographic primitives to safely connect clients and servers. In the 25 years since its founding, computing power and speeds in accordance with Moore’s Law have necessitated increasingly complicated low-level algorithms.
As of 2020, the most widely adopted asymmetric crypto algorithms in the PKI world are RSA, DSA, ECDSA, and EdDSA. So which one is best? Well, it depends.
A fun little side project by Mislav Cimperšak where you plug in a few values and it generates a shareable replica of XKCD’s famous Compiling comic. Here it is in action with a piece of modern art I call, “Low Hanging Fruit”. 😁
Expose is a beautiful, open source, tunnel application that allows you to share your local websites with others via the internet.
Since you can host the server yourself, you have full control over the domains that your shared sites will be available at. You can extend expose with additional features and middleware classes on the server and client side, to make it suit your specific needs.
Alan Shreve closed ngrok’s source code years ago, and every now-and-again an open source alternative pops on the scene. Add Expose to the list. It’s written in PHP and has a nice shine on it. But which of these SSH tunneling tools is best in class?
This list is a lot longer than I expected! Alongside each app is an icon indicating whether it’s written in Swift or Objective-C, which is nice for those of us looking for reading material. 💪
If you need a JS runtime that supports TypeScript out of the box and has security as a top-most priority, star this repo and come back when it’s no longer “Segfaulty”.
Feature bullets! 👇
- No package.json, no npm. Not backwards compatible with Node
- Single executable
- Defaults to read-only file system access
- Always dies on uncaught errors
- Supports top-level await
EDIT: it’s worth noting that this project is by Ryan Dahl, inventor of Node.js.
Inspired by Vim’s modal editing, but built to be as simple as possible. This is no fly-by-night proof of concept. It’s 3 years in the making and looks extremely polished.
I’m definitely going to give Amp a test-drive. 👌
mostly’s purpose is to serve as a lightweight, easy-to-comprehend starting point, with a focus on providing a great developer experience while helping you get high quality and maintainable web applications deployed rapidly.
It uses Express for the server and React for the client. Worth a look if you’re starting up a new web project. I dig this point about it:
Nothing is hidden, nothing is magical, and all of the “plumbing” is accessible and simple.
Amjith shares a simple git alias he uses to resume work from where he left off. Perhaps you’ll find it useful, too.
Olivier Lacan on why we should all stop using
cd and start using
j (a.k.a. autojump). I’ve been wasting soooo many keystrokes over the years! 😱
Biscuit is a monolithic, POSIX-subset operating system kernel in Go for x86-64 CPUs. It was written to study the performance trade-offs of using a high-level language with garbage collection to implement a kernel with a common style of architecture.
With ~38k commits and 8+ years of dev, this has been a massive effort. Find the research paper right here.
I’ve had never really come into contact with hardware programming, working mostly in python or C#, until a friend of mine asked me for some help with programming a simple controller for RGB strips using Arduino Nanos.
We’d, of course, fail spectacularly.
Not only did our hardware not work quite like intended and a few Nanos died in the process(but that’s a story for another time), but I actually learned a lot from this and similar projects.
And I want to tell you some of my mistakes, what I learned by making them and how to prevent them.
Two great tastes that taste great together.
All styles are generated from Tailwind CSS source and not hard-coded, which makes it easy to keep this module up-to-date with latest changes in Tailwind CSS itself.
Stripe Atlas has a wide array of guides to running an internet business that are totally open and free for everyone. This guide is on “scaling engineering organizations” and covers everything from recruiting and hiring, training and on-boarding, to retention.
If you haven’t checked this out yet, it’s a 15 minutes or less read.