Console Logging the Right Way
March 22, 2022 — Haters gonna hate and call you uncultured but when it comes to debugging, doing console.log()
is one of best the best ways of all time. Period. Well! sort of!
A blog on PHP, JavaScript, and more
March 22, 2022 — Haters gonna hate and call you uncultured but when it comes to debugging, doing console.log()
is one of best the best ways of all time. Period. Well! sort of!
March 21, 2022 — The other day, I was stumbled upon a scenario where I need to check whether there exists at least one key of a certain value in an array of objects.
March 16, 2022 — Recently, I came across a very handy tip by Nuno Maduro where you can refactor some of the conditionals in your code to callables to make your code more elegant and readable.
March 10, 2022 — Working on one of the apps which built on top of React.js, I stumbled upon a scenario where I needed to use the value of a state variable immediately after it’s updated.
March 8, 2022 — With every new release, the Chrome team would release new features, improve the existing ones, and fix bugs. But on top of this, the team also ships some of the experimental features, sometimes called origin trials, that developers can try out and give feedback.
March 7, 2022 — When working with React.js components, you might end up in a situation where you would be using an event handler more than once.
March 4, 2022 — Sometimes, the things you would think are quite obvious and should exist without a doubt don’t exist at all.
February 28, 2022 — Converting some values to boolean is a common task while building applications. Now, these values can be anything.
February 25, 2022 — When it comes to traversing arrays in JavaScript, there are essentially two ways using which you can do this.
February 23, 2022 — Web application security is not just restricted to protecting the technologies or the features being used in developing an app; it’s more about safeguarding the methods, web servers, and processes. Moreover, it expands its horizons to protect web services such as APIs from online security threats.