Awesome golang books list for inspiration and education

Credits to this github repo! Books Starter Books Advanced Books Web Development Resources Books Starter Books The Little Go Book Free The Little Go Book is a free introduction to Google’s Go programming language. It’s aimed at developers who might not be quite comfortable with the idea of pointers and static typing. It’s longer than the other Little books, but hopefully still captures that little feeling. An Introduction to Programming in Go Free This book is a short, concise introduction to computer programming using the language Go. Designed by Google, Go is a general purpose programming language with modern features, clean syntax and a robust well-documented common library, making it an ideal language to learn as your first programming language. ...

December 2, 2022 · 29 min · Vadzim Belski
The foreign function interface to call Rust library from Golang

The foreign function interface to call Rust library from Golang

Intro Imagin that you have a project written in C/C++ or even Rust and you would like to call functions from this project library in your Golang application. Wonderful thign is that there is a solution for that called FFI. A foreign function interface (FFI) is a mechanism by which a program written in one programming language can call routines or make use of services written in another. The primary function of a foreign function interface is to mate the semantics and calling conventions of one programming language (the host language, or the language which defines the FFI), with the semantics and conventions of another (the guest language). This process must also take into consideration the runtime environments and/or application binary interfaces of both. This can be done in several ways: ...

August 24, 2022 · 6 min · Vadzim Belski
The Dining Philosophers Problem

The Dining Philosophers Problem

Intro I would like to share classical problem with philosophers. This classic problem shows the various elements of parallelism. The complexity of the implementation of the task lies in the fact that a simple implementation can go into a hopeless state. The problem is defined like this: In ancient times, wealthy philanthropists invited five eminent philosophers to visit. Each of them was given a room in which they could engage in their professional activity—thinking. There was also a common dining room, where there was a large round table, and five chairs around it. Each chair had a plaque with the name of the philosopher who was supposed to sit on it. To the left of each philosopher was a golden fork, and in the center of the table was a large bowl of spaghetti, which was constantly replenished. As befits philosophers, they spent most of their time in thought. But one day they felt hungry and went to the dining room. Everyone sat down on their chair, took a fork and stuck it into the bowl of spaghetti. But the nature of tangled spaghetti is such that a second fork is needed to push the spaghetti into the mouth. That is, the philosopher also needed a fork to his right. The philosophers put down their forks and got up from the table, continuing to think. After all, the fork can only be used by one philosopher at a time. If another philosopher wants to take it, then he will have to wait until she is released. ...

August 16, 2022 · 8 min · Vadzim Belski

Kubernetes containers integrity monitoring

Integrity Monitoring for Containerized Applications: Ensuring Security Through Hash Functions Containerized applications have revolutionized software deployment, but they also present unique security challenges. One crucial aspect of container security is integrity monitoring. This blog post explores how to implement robust integrity monitoring using hash functions to protect your containerized applications from malicious modifications. What is Integrity Monitoring? Integrity monitoring is a security process that checks a container’s file system for unauthorized changes. It ensures that files haven’t been maliciously modified, updated, or added. If any compromises are detected, the system can automatically roll back the deployment to a previous, secure version. ...

February 11, 2021 · 2 min · Vadzim Belski