sepfy/pear is an open source project licensed under MIT License which is an OSI approved license.
Similar projects and alternatives to pear
The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
Scout APM - Leading-edge performance monitoring starting at $39/month. Scout APM uses tracing logic that ties bottlenecks to source code so you know the exact line of code causing performance issues and can get back to building a great product faster.
A cryptographically verifiable code review system for the cargo (Rust) package manager.
Simple yet fancy CPU architecture fetching tool
C/C++ WebRTC Data Channels and Media Transport standalone library
Open source firmware for Ingenic T20 based devices such as WyzeCam V2, Xiaomi Xiaofang 1S, iSmartAlarm's Spot+ and others.
Pixel art search engine for opengameart
JUICE is a UDP Interactive Connectivity Establishment library
Single executable(static), batteries included, Lua 5.1 interpreter.
Pear - A WebRTC Toolkit for IoT/Embedded Devices (a work-in-progress)
reddit.com/r/C_Programming | 2021-04-08
Hacker News top posts: Apr 8, 2021
reddit.com/r/hackerdigest | 2021-04-08
A simple C implementation to stream H.264 to browser using WebRTC\ (61 comments)
A simple C implementation to stream H.264 to browser using WebRTC
reddit.com/r/patient_hackernews | 2021-04-08reddit.com/r/hackernews | 2021-04-08news.ycombinator.com | 2021-04-07
I think there's some truth in what as-j is saying. Rust binaries (and C++ ones) tend to be larger than C ones. I think the major reasons are (a) Rust dependencies being statically linked due to a lack of ABI stability, (b) inclusion of portions of the (statically linked, see a) Rust standard library used by the program where C code uses libc, (c) code bloat due to monomorphization, (d) the ease of just using a full-featured library where someone writing in C might cheat a little bit. As an example of what I mean by the last point, see sdp_attribute_get_answer in this codebase.  It's writing JSON, but it doesn't use a JSON library that actually escapes the included string. It just assumes the included string doesn't have a quote character in it. Is that assumption valid? Will it always be valid? I'm not sure on quick inspection.
There are ways around all of these:
* a. Static vs dynamic linkage: in an embedded system, it'd be reasonable to just produce a single userspace binary that does everything. It can change its behavior based on argv. I think this is not too unusual for constrained systems even with C binaries. Eg busybox does it. If you only have one binary, you don't need dynamic linking. Also, I think it's not strictly true that Rust doesn't support dynamic linking. I think you can dynamically link everything if you ensure the whole system is built with the same compiler version.
* b. Standard library. You don't have to use it at all, or you can use it sparingly, paying only for what you use.
* c. Monomorphization. You could write (for example) a Go-like map  rather than relying so heavily on monomorphization. I'd love to see someone take this idea as far as possible; it might be a good idea for a lot of non-inner-loop code in general, not just on tight embedded systems.
* d. Using full-featured libraries. Obviously no one is making you do this; the same cheats available in C are available in Rust.
but in fairness, the further you go down this path, the further you are from just being able to just take advantage of the whole Rust ecosystem.
Personally, I'd still rather develop or use a #![no_std] Rust codebase than a C one. Memory safety is important to me. IOT devices are no exception to that. Their security is historically horrible but I'd like to change that.news.ycombinator.com | 2021-04-07