By Mr. Granger (Own work) [CC0], via Wikimedia Commons

First impressions of Idris

Ashley Hewson wrote “Lately I’ve invested some time learning Idris. I wanted to share some thoughts on being a beginner at Idris, in no particular order. My experience has been positive overall, so if you’ve been tempted to try it out, I hope this will encourage you to go ahead. I’m not going to discuss my motivation for…”

By Prashant Shrestha from Kathmandu, Nepal (branches Uploaded by russavia) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons

Everything you ever wanted to know about git submodules and more

Ashley Hewson wrote “I regularly hear complaints that git submodules are difficult to work with. If you search for ‘git submodules’, then (depending on your filter bubble) you’ll probably get several blog articles warning you not to use them. I agree that the UI is not at all intuitive,1 but like most things in git, submodules are quite…”

By Loozrboy from Toronto, Canada (Stacks Uploaded by Skeezix1000) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons

Optimising compilers as adversaries

Ashley Hewson wrote “Suppose that you want to handle some secret data in C and, in the wake of some high-profile vulnerability or other, want to take precautions against your secret being leaked. Perhaps you’d write something along these lines: #include <string.h> typedef struct {   char password[16]; } secret_t; void get_secret(secret_t* secret); void use_secret(secret_t* secret); void wipe_secret(secret_t*…”