Happy holiday for US reader. We have quite a few interesting tool of this week. Check them out.
For video, let’s sit down and listen to Louis Pilfold, creator of Gleam lang, talks about trade off of dynamic language, Rust vs Elixir, willing to throw away your first version on refactor it. I learn a lot and I hope you do too
Let's Build a Regex Engine
Ever wondered how regex works under the hood? How does it understand an incantation like “<\/?[\w\s]*>|<.+[\W]>” and magically produces a desired result? This 3 parts serie is going to describe exactly how it works and how to implement a feature-rich regex engine.
File Permissions: the painful side of Docker
If you used Docker in dev, prod or share files among a few containers, access file on host, you will know this pain.
We will learn about a few solutions and use case to fix file permission.
Containers at scale
Engineering leaders at Datadog, Braze, and BetterUp discuss container tools, testing, and monitoring, and how they’ve approached container migrations
SQL Query Optimization: Understanding Key Principle
This guide is intended to help you gain a true understanding of SQL query speeds. It includes research that demonstrates the speed of slow and fast query types. If you work with SQL databases such as PostgreSQL, MySQL, SQLite, or others similar, this knowledge is a must.
How to interpret PostgreSQL explain analyze output
EXPLAIN ANALYZE is the key to optimizing SQL statements in PostgreSQL. This article does not attempt to explain everything there is to it. Rather, I want to give you a brief introduction, explain what to look for and show you some helpful tools to visualize the output.
How /proc/self/mem writes to unwritable memory
An obscure quirk of the /proc/*/mem pseudofile is its “punch through” semantics. Writes performed through this file will succeed even if the destination virtual memory is marked unwritable. This behavior raises some questions: Is privileged code subject to virtual memory permissions? In general, to what degree can the hardware inhibit kernel memory access?
Elliptic Curve Cryptography(ECC) Explained
Today, we can find elliptic curves cryptosystems in TLS, PGP and SSH, which are just three of the main technologies on which the modern web and IT world are based. Before ECC become popular, almost all public-key algorithms were based on RSA, DSA, and DH, alternative cryptosystems based on modular arithmetic. And the foundations of ECC are still a mystery to most. In this we have this link to dive into ECC, and another great one Elliptic Curve Cryptography: a gentle introduction
How we sped up Chrome DevTools stack traces by 10x
Web developers have come to expect little to no performance impact when debugging their code. However, this expectation is by no means universal. A C++ developer would never expect a debug build of their application to reach production performance, and in early years of Chrome, simply opening DevTools significantly impacted the performance of the page. This post laid out what Chrome team did to improve their
Code to read
calculator (both program and library) that supports user-defined variables, functions, derivation, and integration. It runs on Windows, macOS, Linux, Android, and in web browsers (with WebAssembly).
The core Rust component power all the logic and share code for web, mobile and cli.
math and logic formula parser and evaluator
View and control remote terminals from your browser with end-to-end encryption
🔥 ~6x faster, stricter, configurable, extensible, and beautiful drop-in replacement for golint
The Gleam Programming Language and its Creator Louis Pilfold
“I like how Louis talk about the upfront trade off of dynamic vs static type language and how Rust help Gleam, why version 2 is better. You will learn alot about trade off, system design from this talk even if your work has nothing to do with Erlang, Rust, or Gleam”
Uptime monitor and status page powered by GitHub Actions, Issues, and Pages. Super power I must say.
The Open Source Airtable alternative.
A self-hosted open source photo management service.
a library for InfoSec investigation and hunting in Jupyter Notebooks: query log data, enrich the data with Threat Intelligence, geolocations, extract Indicators of Activity (IoA) from logs and unpack encoded data…
An open source remote desktop client software written in Rust, work in Win, Mac, Linux
Disk usage analyzer with console interface.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this