Document Your Process.
Businesses aren't the only ones who need marketing. Even if you never plan on going into business for yourself, creating content around your particular software engineering intrests will build your brand and will open more software engineer opportunities for you.
There is only an upside to making content as a developer.
Guard Your Focus Like Your Life Depends on it (it Does).
Go to your screen time app right now, I gurentee if you trade some of those hours for building software you will become a greater software engineer.
Turn your phone on greyscale, use opal or Brick to stop yourself from opening time draining apps, turn on focus mode and get to work. You owe it to your future self.
I'm hiring a video editor / motion graphics editor. I'm looking for someone who can work on a per project basis and has experience doing:
- motion graphics
- animation
- sound design
- thumbnail design
I do explainer videos in the tech / software eningeering space, here is my YouTube: @michaelpope4232/featured" target="_blank" rel="nofollow noopener">youtube.com/@michaelpope42…
Looking for a Fireship kind of animation style - youtube.com/watch?v=3tbB2d…
Link me your work down below and shoot me a message.
RESTful APIs may be dead soon. Instead, web services may expose a single POST entry point for a prompt. Internally, an AI agent may decide how to interpret it and what to do with the data and the database.
@MichaelPope_Dev I'm an editor here and I understand what you are looking for, I have done explainer videos before but I can't show you, your DMs are closed
Bun's new vibe-coded +1,000,000 line Rust port has:
1,980 .unwrap() calls.
4,002 .expect() calls.
1,298 panic! / unreachable! / unimplemented! / todo! macros.
That's 7,280 process abort points across 1,433 Rust files. The config file also enables panic_immediate _abort, so when it fires it's going to crash with no formatted message for the user.
This, on top of the fact that as many GitHub users in the PR thread mentioned, this port was praised for the fact that the unit testing for the repo still passed.
What they didn't mentioned, as many Github users in the comment thread of the PR were quick to point out, was that there were tests that were modified, and in some cases commented out in order to pass.
There are 4 disabled tests:
serve.test.ts, bun-build-api.test.ts, spawn-stdin-pipe-fd-leak.test.ts, fetch-leak.test.ts
all of which cite: docs/ZIG_RUST_DIVERGENCE_AUDIT.md
But that file doesn't exist in the repo
it's supossed to be the source of truth for known regressions that happened from the Rust port.
Some users even pointed out the unwrap logic could open up Bun to DoS attacks, from malformed user-controlled config strings. It looks like the devs defended against this bug in a number of spots inside the codebase, but it is worrying.
Since Anthropic acquired Bun, I wonder how much of this was motivated from the top down to boost PR for Claude Code.
Here is the PR, check it out for yourself.
github.com/oven-sh/bun/pu…
@memory_prism@thekitze LMAO
tbh, I write a lot more of the code myself today, when claude code first dropped it was really cool ngl, but it makes so many mistakes and it's so boring waiting around for it to work that I just write the code myself now
@MichaelPope_Dev@thekitze Some of my friends tout how productive they are with other strategies like using Claude from the console but I just don’t see it tbh. I’m gonna keep burying my head in the sand 😂
> be github
> invent copilot
> you are literally the first one
> you are literally the only one
> you literally have access to all the code in the world
> get mogged by literally every single agentic bs that came out in the past few years
this level of fumble should be studied
Capturing Raw Network Traffic Packets in C
I built a my own mini wireshark (network traffic monitor for my Laptop), to monitor raw data packets as they come over the network and hit my laptop.
Using the pcap C library, I'm logging the raw data packets that hit my laptop, and the size of the incoming packets, then log them to the terminal. The really cool part is as I use chrome or any other software that makes outbound network requests, I can see the network traffic spike in realtime.
This is part of a larger project i'm working on to build my own web scraper/automation software inside of C/Rust, I'm using this to filter monitor the TLS handshake my chrome browser is making, and will use that as the basis for the TLS fingerprint I use on my automation and compare the results.
It's a lot of fun, and I'm learning much more about computer networking and cyber security.
#c#coding#softwareengineer#programing#cybersecurity#wireshark#computernetworking