news
Programming Leftovers
-
Chris ☛ Non-Obvious Haskell Idiom: Guard-Sequence
Reading production Haskell code, we sometimes stumble over idioms that look confusing at first, but which show up frequently enough that they are worth learning. This is one of those examples, where we optionally return something with guard-sequence.
-
Keith Harrison ☛ Swift Raw Identifiers
Swift constant and variable identifier names cannot contain certain characters such as whitespace or mathematical symbols. They also cannot begin with a number. Swift 6.2 implements SE-0451 which allows us to relax those rules by surrounding the identifier name with backticks. There’s a couple of cases where I might find that useful: [...]
-
Hackaday ☛ Lisp In 99 Lines Of C With TinyLisp
As one of the oldest programming languages still in common use today, and essential for the first wave of Artificial Intelligence research during the 1950s and 60s, Lisp is often the focus of interpreters that can run on very low-powered systems. Such is the case with [Robert van Engelen]’s TinyLisp, which only takes 99 lines of C code and happily runs on the Z80-based Sharp PC-G850V(S) pocket computer with its 2.3 kB of internal RAM and native C support.
-
Qt ☛ Introducing the Qt Certification Testing Platform – Your Path to Validating Qt Expertise
-
Qt ☛ Qt 6.8 RTOS Update
It’s been a while since our last RTOS support update so we wanted to make you aware of our recent enhancements regarding our RTOS feature set. We today support QNX, INTEGRITY as well as VxWorks on Qt 6.8 and have updates for each.
-
Rlang ☛ Handling Missing Data in R: A Comprehensive Guide
Missing data is one of the most common challenges in data analysis and statistical modeling.
Whether the data originates from surveys, administrative registers, or clinical trials, it is almost inevitable that some values are abs...
Continue reading: Handling Missing Data in R: A Comprehensive Guide
-
Rlang ☛ Affordable Shiny app hosting for 500 concurrent users
Cloud providers are no longer just offering traditional x86-based servers,
ARM-based servers are now becoming a serious alternative. And for good reason:
they’re often far more cost-effective and power-efficient than their x86
counterparts.
-
Python
-
The Register UK ☛ Python usage growing while Foundation struggles for funds
The actual survey took place in late 2024, and the raw data we downloaded has closer to 29,000 responses, but the discrepancy could be from the PSF filtering the results to remove spam and under-18s. 72 percent of respondents use Python for work, the rest being educational or hobbyist developers.
-
LWN ☛ Preventing domain-resurrection attacks (PyPI blog)
The Python Package Index (PyPI) has announced that it is now checking for expired domains to try to prevent domain-resurrection attacks. In this type of attack, a malicious user buys an expired domain and uses it to take over an account by resetting the password associated with the email used with PyPI. Since June, PyPI has unverified more than 1,800 email addresses after their associated domains entered expiration phases.
-
Python Package Index ☛ Preventing Domain Resurrection Attacks
PyPI user accounts are linked to email addresses. Email addresses are tied to domain names; domain names can expire if unpaid, and someone else can purchase them.
During PyPI account registration, users are required to verify their email addresses by clicking a link sent to the email address provided during registration. This verification ensures the address is valid and accessible to the user, and may be used to send important account-related information, such as password reset requests, or for PyPI Admins to use to contact the user.
PyPI considers the account holder's initially verified email address a strong indicator of account ownership. Coupled with a form of Two-Factor Authentication (2FA), this helps to further secure the account.
-
-
Rust
-
Rust Blog ☛ The Rust Programming Language Blog: Demoting x86_64-apple-darwin to Tier 2 with host tools
In Rust 1.90.0, the target
x86_64-apple-darwin
will be demoted to Tier 2 with host tools. The standard library and the compiler will continue to be built and distributed, but automated tests of these components are no longer guaranteed to be run.
-
-
Standards/Consortia
-
Teleport ☛ ISO 27001:2022 Requirements Explained for 2025
ISO/IEC 27001:2022 provides a framework for managing information security using an Information Security Management System (ISMS).
The October 2025 deadline to upgrade from the previous ISO 27001:2013 standard is coming fast, and organizations yet to transition risk losing their certification. Maintaining ISO/IEC 27001 certification is especially relevant for regulated industries, SaaS providers with enterprise customers, and global organizations handling sensitive data.
In this blog, we break down ISO 27001 requirements in 2025, what’s changed from 2013 to 2022, and how Teleport can help simplify ISO compliance and accelerate the journey to new or re-certification.
-