Series
Here are all the posts in this series about the slices package.
Binary Search
Clip, Clone, and Compact
Compare
Contains, Delete, and Equal
Introduction
In the last post of this series I discussed the Clip, Clone, and Compact APIs from the slices package. In this post, I...
Many years ago I've re-posted a Stack Overflow answer with Python code for a terse prime sieve
function that generates a potentially infinite sequence of prime
numbers ("potentially" because it will run out of memory eventually). Since
then, I've used this code many tim...
I was cobbling together a long-running Go script to send webhook messages to a system when
some events occur. The initial script would continuously poll a Kafka topic for events and
spawn new goroutines to make HTTP requests to the destination. This had two problems:
It could cr...
I was cobbling together a long-running Go script to send webhook messages to a system when
some events occur. The initial script would continuously poll a Kafka topic for events and
spawn new goroutines to make HTTP requests to the destination. This had two problems:
It could cr...
I was cobbling together a long-running Go script to send webhook messages to a system when
some events occur. The initial script would continuously poll a Kafka topic for events and
spawn worker goroutines in a fire-and-forget manner to make HTTP requests to the
destination. This...
Control goroutine concurrency with buffered channels as semaphores. Prevent resource exhaustion with backpressure patterns in Go workers.
The Go 1.21 standard library includes a new structured logging package, log/slog.
In this post I’m going to talk about some old text editors you probably never
heard of, what is modal text editing, and why people like it so much.
A TOTP1 based 2FA system has two parts. One is a client that generates the TOTP code. The
other part is a server. The server verifies the code. If the client and the server-generated
codes match, the server allows the inbound user to access the target system. The code
usually exp...
A TOTP based 2FA system has two parts. One is a client that generates the TOTP code. The
other part is a server. The server verifies the code. If the client and the server-generated
codes match, the server allows the inbound user to access the target system. The code
usually expi...