Design Patterns in Go
This course provides an overview of all the Gang of Four (GoF) design patterns as outlined in their seminal book, together with modern-day variations, adjustments, discussions of intrinsic use of patterns in the language. Design Patterns are reusable solutions to common programming problems. They were popularized with the 1994 book Design Patterns: Elements of Reusable Object-Oriented Software by Erich Gamma, John Vlissides, Ralph Johnson and Richard Helm (who are commonly known as a Gang of Four, hence the GoF acronym).
More
The original book GoF book used C++ and Smalltalk for its examples, but, since then, design patterns have been adapted to every programming language imaginable: C#, Java, Swift, Python, JavaScript and now — Go!
The appeal of design patterns is immortal: we see them in libraries, some of them are intrinsic in programming languages, and you probably use them on a daily basis even if you don't realize they are there.
This course provides a comprehensive overview of Design Patterns in Go from a practical perspective. This course in particular covers patterns with the use of:
The latest versions of the Go programming language
Use of modern programming libraries and frameworks
Use of modern developer tools such as JetBrains GoLand
Discussions of pattern variations and alternative approaches
What Patterns Does This Course Cover?
This course covers all the GoF design patterns. In fact, here's the full list of what is covered:
SOLID Design Principles: Single Responsibility Principle, Open-Closed Principle, Liskov Substitution Principle, Interface Segregation Principle and Dependency Inversion Principle
Creational Design Patterns: Builder, Factories (Factory Method and Abstract Factory), Prototype and Singleton
Structrural Design Patterns: Adapter, Bridge, Composite, Decorator, Façade, Flyweight and Proxy
Behavioral Design Patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method and Visitor
Who Is the Course For?
This course is for Go developers who want to see not just textbook examples of design patterns, but also the different variations and tricks that can be applied to implement design patterns in a modern way. For example, the use of the Composite pattern allows structures to be iterable and lets scalar objects masquerade as if they were collections.
Presentation Style
This course is presented as a (very large) series of live demonstrations being done in JetBrains GoLand and presented using the Kinetica rendering engine. Kinetica removes the visual clutter of the IDE, making you focus on code, which is rendered perfectly, whether you are watching the course on a big screen or a mobile phone.
Most demos are single-file, so you can download the file attached to the lesson and run it in GoLand, or another IDE of your choice (or just run them from the command-line).
This course does not use UML class diagrams; all of demos are done via live coding.
- Good understanding of Go
- Familiarity with latest Go language features
- Good understanding of software design principles
- A computer with latest Go compiler and (hopefully) an IDE
- Software engineers
- Web developers
- Designers
- Architects
What you'll learn:
- Recognize and apply design patterns
- Refactor existing designs to use design patterns
- Reason about applicability and usability of design patterns
Watch Online Design Patterns in Go
# | Title | Duration |
---|---|---|
1 | Introduction | 04:03 |
2 | Overview | 01:17 |
3 | Single Responsibility Principle | 12:18 |
4 | Open-Closed Principle | 19:07 |
5 | Liskov Substitution Principle | 10:11 |
6 | Interface Segregation Principle | 08:30 |
7 | Dependency Inversion Principle | 15:01 |
8 | Summary | 02:37 |
9 | Overview | 01:43 |
10 | Builder | 12:53 |
11 | Builder Facets | 10:14 |
12 | Builder Parameter | 06:55 |
13 | Functional Builder | 05:11 |
14 | Summary | 01:14 |
15 | Overview | 02:50 |
16 | Factory Function | 03:28 |
17 | Interface Factory | 04:55 |
18 | Factory Generator | 09:38 |
19 | Prototype Factory | 03:54 |
20 | Summary | 00:57 |
21 | Overview | 01:52 |
22 | Deep Copying | 05:37 |
23 | Copy Method | 05:31 |
24 | Copy Through Serialization | 05:39 |
25 | Prototype Factory | 07:05 |
26 | Summary | 00:32 |
27 | Overview | 02:56 |
28 | Singleton | 05:57 |
29 | Problems with Singleton | 04:22 |
30 | Singleton and Dependency Inversion | 05:31 |
31 | Summary | 01:32 |
32 | Overview | 01:58 |
33 | Adapter | 13:31 |
34 | Adapter Caching | 07:03 |
35 | Summary | 00:48 |
36 | Overview | 02:22 |
37 | Bridge | 08:06 |
38 | Summary | 00:50 |
39 | Overview | 01:26 |
40 | Geometric Shapes | 06:52 |
41 | Neural Networks | 08:07 |
42 | Summary | 00:46 |
43 | Overview | 01:51 |
44 | Multiple Aggregation | 09:10 |
45 | Decorator | 10:31 |
46 | Summary | 00:59 |
47 | Overview | 01:54 |
48 | Façade | 08:04 |
49 | Summary | 01:13 |
50 | Overview | 02:03 |
51 | Text Formatting | 14:43 |
52 | User Names | 12:18 |
53 | Summary | 00:51 |
54 | Overview | 02:05 |
55 | Protection Proxy | 04:10 |
56 | Virtual Proxy | 06:32 |
57 | Proxy vs Decorator | 01:24 |
58 | Summary | 00:55 |
59 | Overview | 03:00 |
60 | Method Chain | 13:50 |
61 | Command Query Separation | 01:26 |
62 | Broker Chain | 16:35 |
63 | Summary | 00:58 |
64 | Overview | 02:23 |
65 | Command | 06:20 |
66 | Undo Operations | 04:14 |
67 | Composite Command | 12:25 |
68 | Functional Command | 03:04 |
69 | Summary | 00:50 |
70 | Overview | 02:47 |
71 | Lexing | 07:25 |
72 | Parsing | 11:18 |
73 | Summary | 01:03 |
74 | Overview | 01:07 |
75 | Iteration | 08:21 |
76 | Tree Traversal | 12:20 |
77 | Summary | 00:45 |
78 | Overview | 01:27 |
79 | Chat Room | 12:49 |
80 | Summary | 00:57 |
81 | Overview | 01:30 |
82 | Memento | 05:06 |
83 | Undo and Redo | 10:18 |
84 | Memento vs Flyweight | 00:49 |
85 | Summary | 01:46 |
86 | Overview | 01:30 |
87 | Observer and Observable | 09:42 |
88 | Property Observers | 09:44 |
89 | Property Dependencies | 06:37 |
90 | Summary | 01:06 |
91 | Overview | 01:55 |
92 | Classic Implementation | 11:08 |
93 | Handmade State Machine | 10:19 |
94 | Switch-Based State Machine | 05:42 |
95 | Summary | 01:15 |
96 | Overview | 01:38 |
97 | Strategy | 10:21 |
98 | Summary | 00:36 |
99 | Overview | 01:52 |
100 | Template Method | 07:01 |
101 | Functional Template Method | 03:57 |
102 | Summary | 00:58 |
103 | Overview | 02:22 |
104 | Intrusive Visitor | 08:52 |
105 | Reflective Visitor | 06:26 |
106 | Dispatch | 01:21 |
107 | Classic Visitor | 14:26 |
108 | Summary | 00:59 |
109 | Course Summary | 07:45 |
110 | End of Course | 01:10 |