Every time I think I have a good use for hash impersonators, it turns out they
don't work the way I expect.
So I'll invert the question: in what situation is a hash impersonator the best
tool for the job? (Or, have they been eclipsed by other language features like
`gen:dict`?)
IIUC, `imper
I think the primary thing they've ended up being for is contracts, which is
why they were originally created. The restrictions you mention, plus the
dictionary interface, have meant that they don't get used much for other
things.
Sam
On Nov 4, 2017 1:25 PM, "Matthew Butterick" wrote:
> Every ti
Hi everyone,
The Ubuntu PPA has been updated for v6.11. The PPA is available here:
https://launchpad.net/~plt/+archive/ubuntu/racket
It's currently available for zesty and artful. Builds for xenial and trusty
should go up later hopefully.
Cheers,
Asumu
--
You received this message because y
If you want to download videos of RacketCon and Inside Racket Seminar
(such as to put them on your gym video device), I've found that Unix
shell scripts like these are an easy way:
http://www.neilvandyke.org/racket/download-racketcon-2014-videos.sh
http://www.neilvandyke.org/racket/download-rac
4 matches
Mail list logo