PinnedDavid LeeSo You Think You Know GitI’ve been working with Git for a while and for a long time I did not know I could take the Git use to the next level. I thought Git is…Apr 248Apr 248
PinnedDavid LeeIt’s 2024, I Haven’t Used Git WorktreeI have to admit that I did not know Git worktree before and haven’t used it , but I am not ashamed of myself, because Guido van Rossum did…Mar 2511Mar 2511
PinnedDavid LeeA Rapid Guide to All Rust FeaturesThis article is my recent learning journal on Rust. I find when it takes you 60min+ to watch a similar video on YouTube, it might need your…Dec 31, 20233Dec 31, 20233
PinnedDavid LeeHexagonal Architecture Deep Dive with PostgreSQL, Redis and Go PracticesNeal Ford & Mark Richards, in their book Fundamentals of Software Architecture: An Engineering Approach, came up with four dimensions that…Apr 18, 20238Apr 18, 20238
PinnedDavid LeeinTowards Dev6 Tips on High Performance Go — Advanced Go Topics6tips: benchmarking, profiling, Compiler optimisations, Understanding the execution tracer, Memory management and GC tuning, ConcurrencyApr 26, 20236Apr 26, 20236
David LeeRust vs Go in Error HandlingI’ll start with the way of Rust. If you are reading some Rust code, you must have seen ?here and there. Along with it there are also…Aug 183Aug 183
David LeeinTowards DevYou don’t Need a Book to Know DDD(Domain-Driven Design)It took me a while to figure out the patterns behind DDD, though the most important thing are ubiquitous language and bounded context. In…Aug 173Aug 173
David LeeinStackademicAnemic Domain Model Simply ExplainedIn case you are not familiar with this pattern, just have a quick look at https://martinfowler.com/bliki/AnemicDomainModel.htmlAug 17Aug 17
David LeeOrphan Rule in Rust Simply ExplainedThe orphan rule in Rust is a rule that prevents you from implementing a trait for a type if both the trait and the type are defined outside…Aug 171Aug 171
David LeeHow Man-in-the-Middle (MITM) Attack WorksHave you ever used network debugging tools like Charles proxy? Wonder how could it intercept encrypted payload (http2) under the hood?Jul 28Jul 28