Go to books ↓
How To Shoot Yourself In the Foot With Prototypes!
Stop. For the next 30 days, don’t write any for loops. If you see a nasty pile of those gnarly things, replace them with an each or a map. Do a little reducing.
Promises capture the notion of an eventual value into an object.
An example of how to calculate the standard deviation for a given data set.
With the web slowly maturing as a platform the demand for cryptography in the browser has risen, especially in a post-Snowden era. Many of us have heard about the upcoming Web Cryptography API but at the time of writing there seem to be no good introductions available. We will take a look at the proposed W3C spec and its current state of implementation.
In technical interviews, it is common that the interviewer will throw in a question that tests your knowledge of higher-order functions and function-binding.
Most of these techniques involve common sense once you have understood the underlying problem.
When dealing with errors, handling them at the perimeter of your application isn't always sufficient. By the time the error bubbles up, you've often lost a lot of the context in which the error was thrown. As such, people will sometimes catch an error, record it locally in some way, and then rethrow it.
Is the delete operator of any use? There also exists funny named splice() and slice(), what about those? I want to modify the array in-place.
Every developer strives to write maintainable, readable, and reusable code. Code structuring becomes more important as applications become larger. Design patterns prove crucial to solving this challenge – providing an organization structure for common issues in a particular circumstance.
In case you missed it, Node now supports async/await out of the box since version 7.6. If you haven’t tried it yet, here are a bunch of reasons with examples why you should adopt it immediately and never look back.
Third-party scripts provide a wide range of useful functionality, making the web more dynamic, interactive, and interconnected. These scripts may be crucial to your website's functionality or revenue stream. But third-party scripts also come with many risks that should be taken into consideration to minimize their impact while still providing value.
We look at using map, filter, and reduce to manipulate arrays of objects, using techniques borrowed from functional programming.
ES2018+, a.k.a ESnext, a.k.a ECMA-262 is giving us devs some shiny new toys.
These patterns provide a stable foundation for a project, of any framework, any methodology, any team size — reducing the need for documentation, refactoring, and amount of tears shed by the developers’ eyes.
It could be possible for any website to access this data. This vulnerability is called JSON hijacking, and allows websites to extract the JSON data from those API's.