Once you have solid separation of abstraction and implementation with the bridge pattern, it’s time to exploit. In this episode, we exploit the separation to help with memory issues — by sharing implementors. And, in the process, saving a dear, old friend.
You'll need an account to access this thunky content. Sign-up for a most compendious plan now!
If you previously created an account, login with one of:
Or a password:
Stay informed of new Thunks with our newsletter. Please trust us, we will never send you spam.