Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Conversations about technology between two friends who disagree on plenty, and agree on plenty more.... more
FAQs about Runtime Arguments:How many episodes does Runtime Arguments have?The podcast currently has 5 episodes available.
June 14, 2025Episode 4: Functional Programming - You're probably already doing itShow notes and things to think about:Functional programing isn't academic. It isn't overwhelming. It isn't impossible to use. It isn't inapplicable to ordinary problems like the ones you're solving right now.You can use functional techniques in almost any modern programming language. In fact, you probably already are.Main pillars of FP:Pure functions (no side-effects)Functions are first-class objects (you can pass them as arguments, you can return them as results, you can store them in lists or any other data-structure)Data is immutable by defaultFP languages often provide powerful pattern matching syntax (didn't mention this much in the episode other than briefly noting Python's new match statement)A couple of things not mentioned: in FP, your code is more about what you want, not about how to get it. That stack of functions for the sales data example looks declarative, not imperative.A couple of other things not mentioned: recursion and lazy evaluation. Not exclusive to FP, but very often available in functional languages.Papers and explanations about monads might be unreadable, but you're already using them and you already know how they work.Using FP techniques appropriately can make your code easier to test, harder to break, and possibly even prettier to look at.There are places in your code right now that you can make better right now with FP. Do it!Links:We mentioned a ton of languages. Most of them have easy to find home pages so I'm not going to list out all the links; but there are a couple of obscure onesThere's nothing for the original Lisp, the closest these days is probably https://common-lisp.net.ML can be found at https://sml-family.org but the more modern and popular variant, OCaml, can be found at http://ocaml.org. Microsoft's take on this is F#, open-sourced at https://fsharp.org.Hosts:Jim McQuillan can be reached at [email protected]Wolf can be reached at [email protected]Follow us on Mastodon: @[email protected]If you have feedback for us, please send it to [email protected]Theme music:Dawn by nuer self, from the album Digital Sky...more29minPlay
May 31, 2025Episode 3: Web AssemblyShow notes:Take-aways from the episode:If you have a compute intensive part of your web application, it may make sense to implement that bit of code in a compiled language like C, C++ or Rust and then compile them to WASM so they can be executed in the browser.Security and Portability. WASM code is secure as it utilizes the browsers' sandbox and portable as all browsers are supporting the W3C Standard WASM.You are almost certainly using WASM based applications. It's in use in Google Maps & Docs, Netflix, Spotify, Amazon and many more.Links:https://emscripten.org/index.htmlhttps://emscripten.org/docs/getting_started/Tutorial.html - Nice tutorialhttps://github.com/WebAssembly/wabt - Web Assembly Binary Toolkithttps://collabnix.com/top-20-companies-that-uses-wasm/ - Companies using WASMhttps://developer.mozilla.org/en-US/docs/WebAssembly/Reference - WASM Instruction sethttps://developer.fermyon.com/wasm-languages/webassembly-language-support - Languages supportedhttps://github.com/snaplet/postgres-wasm - Postgres implemented in WASMHosts:Jim McQuillan can be reached at [email protected]Wolf can be reached at [email protected]Follow us on Mastodon: @[email protected]If you have feedback for us, please send it to [email protected]Theme music:Dawn by nuer self, from the album Digital Sky...more47minPlay
May 17, 2025Episode 2: Bitcoin, Cryptocurrency, and the BlockchainShow notes:Take-aways from the episode:Crypto is not really anonymousCrypto is both regulated and taxed (at least here in the US)Legal uses of crypto outweigh illegal uses. This stuff is legitimate. There are dangers, but crypto is something you might legitimately possessThere are scammers everywhere. Protecting the private key in your wallet is vital to keeping your money: don’t lose it, don’t let it be stolen, don’t give it away. Stealing your private key is much easier than stealing US dollars out of your bank account.Feedback from episodes:Champ at Key 9 Identity sent us a couple of links for blog posts on passkeys.https://blog.k9.io/p/passwords-must-diehttps://blog.k9.io/p/key9-the-2025-security-key-shootoutHosts:Jim McQuillan can be reached at [email protected]Wolf can be reached at [email protected]Follow us on Mastodon: @[email protected]If you have feedback for us, please send it to [email protected]Theme music:Dawn by nuer self, from the album Digital Sky...more50minPlay
May 03, 2025Episode 1: Out of the Datacenter and into the CloudShow notes:Have you thought about moving your computing into the Cloud?This episode takes a look at a real-world adventure that Jim went through when moving his computing infrastructure from purchased servers in a rented rack in a datacenter to a VM Running in a cloud service provider using Docker, Linux, managed PostgreSQL. He covers the steps he took to get there, how it's going, the good stuff and the challenges in making it work.Cloud service providers:https://portal.azure.comhttps://aws.amazon.com/https://cloud.google.com/Technologies used:https://www.postgresql.org/https://www.docker.com/community/open-source/https://www.haproxy.org/https://github.comHosts:Jim McQuillan can be reached at [email protected]Wolf can be reached at [email protected]Follow us on Mastodon: @[email protected]Theme music:Dawn by nuer self, from the album Digital Sky...more51minPlay
April 12, 2025Episode 0: PasskeysShow notes:There are many scams, some to get your password(s), some just for money. Here's a sample list: https://www.experian.com/blogs/ask-experian/the-latest-scams-you-need-to-aware-of/Lists of login methods:https://testdriven.io/blog/web-authentication-methods/ https://www.logintc.com/types-of-authentication/Who implements Passkeys?https://www.passkeys.com/websites-with-passkey-support-sites-directoryhttps://fidoalliance.org/passkeys-directory/https://www.keepersecurity.com/passkeys-directory/The three things that come together to make passkeys:Using key pairs, like SSH: https://www.ssh.com/academy/ssh/public-key-authenticationBiometric authentication, you're already used to it from your phoneNew User Interface "ceremonies"Which password managers support passkeys?1Password (our personal favorite)BitwardenDashlaneGoogle Password ManagerKeeperNordPassRoboFormA little about password managers:Almost any password manager is better than no password manager at all so do your research. Find the best one for you. Make sure it answers these questions:Does it run on all the platforms you care about?Does it have a pricing model you like?Does it use a cloud service, or not, or of your choice, in a way that you like?Does the password service itself have access to your keys?What kind of secrets can it keep?Passkey descriptions and implementation documentsThe FIDO alliance: https://fidoalliance.org/passkeys/Google (for developers): https://developers.google.com/identity/passkeys/developer-guidesApple (for developers): https://developer.apple.com/passkeys/Wolf's top three personal digital security recommendationsUse a password manager (it should support passkeys). See above.Once you create a passkey for a specific service; change your previous password. The new one should be generated by your password manager and you should never use it unless you absolutely must.Make sure your device is secureUse biometric authenticationHave a strong password. Your password manager can generate one made from words. Easy to remember; hard to guess.Make sure you know how to force your device to require a password. You can be tricked or forced to authenticate biometrically. Law enforcement can't force you to reveal a password; and if you're careful, you can't be tricked out of it.Be aware of your surroundings. Bad actors can "shoulder surf" and get your password, or cameras. It's just like the old days at the ATM. You don't want a person right behind you to see your PIN.Hosts:Jim McQuillan can be reached at [email protected]Wolf can be reached at [email protected]Follow us on Mastodon: @[email protected]Theme music:Dawn by nuer self, from the album Digital Sky...more47minPlay
FAQs about Runtime Arguments:How many episodes does Runtime Arguments have?The podcast currently has 5 episodes available.