Just a fun example of an esoteric programming language. Unhappy about JavaScript? Check out this Hello World program in Malbolge: (=<`#9]~6ZY32Vx/4Rs+0No-&Jk)"Fh}|Bcy?`=*z]Kw%oG4UUS0/@-ejc(:'8dc Pure evil. |
|
The rise in frontend complexity stems from the confluence of three megatrends: more devices, exigent users, and market growth. |
|
JavaScript never removes old features – new versions are always backward compatible. I wish we could clean it up, but staying compatible has too many benefits, as Axel explains in this blog post. |
|
Telemetry gives a timeline of browser events leading to errors. Debug better and know why your web app crashed. |
|
The feature set of ECMAScript 2018 was finalized last January at a TC39 meeting. Axel discusses what’s new. |
|
A recent study finds that QUIC largely outperforms TCP except for in the presence of packet re-ordering and on resource-constrained mobile devices. |
|
Surma advises: use httpsOnly cookies where possible, avoid document.cookie , and use X-Content-Type-Options: nosniff . |
|
Learn to drive effective digital communication and prepare for cross-functional careers in information management, design, content strategy, and technology. |
|
Rather than exploring features first, it is helpful to put them into context and to understand how they came to exist. An introduction to GraphQL and lessons learned from the last 60 years of API development. |
|
The WebAssembly API now provides a special function to support streaming compilation in combination with the fetch() Web API. |
|
While learning CSS Grid Layout, Ire found that the best way to internalize all the new concepts and terminology is by working on various layouts using them. She shares a small challenge she came up with for herself. |
|
Mark writes long and deep about his everlasting quest to strike the perfect balance between design affordance, collaboration and convenience. | |
|
From reasonable input validation, salt and pepper to 2FA — Ian’s got you covered. Tired of passwords, password resets, and “security” questions? Then consider a purely passwordless authentication strategy, where you just send an email with a link whenever the user wants to log in! |
|
|
Comments