#coding-practices

[ follow ]
#software-development
fromLogRocket Blog
5 months ago
JavaScript

Automate code commenting using VS Code and Ollama - LogRocket Blog

Comments in code are essential for explaining logic and decision-making, enhancing collaboration for future developers.
fromHackernoon
3 years ago
Java

5 Ways To Fortify Your Code Against Memory Leaks | HackerNoon

Memory leaks can significantly degrade app performance, but there are effective prevention strategies.
fromLogRocket Blog
5 months ago
JavaScript

Automate code commenting using VS Code and Ollama - LogRocket Blog

Comments in code are essential for explaining logic and decision-making, enhancing collaboration for future developers.
fromHackernoon
3 years ago
Java

5 Ways To Fortify Your Code Against Memory Leaks | HackerNoon

Memory leaks can significantly degrade app performance, but there are effective prevention strategies.
more#software-development
#readability
fromHackernoon
1 month ago
Scala

Overusing Implicit Returns Makes Your Code Harder to Read and Debug | HackerNoon

Overusing implicit returns makes code harder to read and debug.
fromHackernoon
2 years ago
JavaScript

Code Smell 268 - Ternary Metaprogramming | HackerNoon

Ternary operators for dynamic method calls reduce code readability and maintainability, introducing potential errors.
fromHackernoon
1 month ago
Scala

Overusing Implicit Returns Makes Your Code Harder to Read and Debug | HackerNoon

Overusing implicit returns makes code harder to read and debug.
fromHackernoon
2 years ago
JavaScript

Code Smell 268 - Ternary Metaprogramming | HackerNoon

Ternary operators for dynamic method calls reduce code readability and maintainability, introducing potential errors.
more#readability
Artificial intelligence
fromThe Hacker News
2 months ago

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

Hard-coded credentials in datasets pose severe security risks for users and organizations.
Large language models may amplify insecure coding practices due to the presence of live secrets in training data.
#debugging
fromHackernoon
2 years ago
JavaScript

Code Smell 287 - Unused Local Assignment | HackerNoon

Avoid assigning values you never use to keep your code clean and maintainable.
fromHackernoon
3 years ago
JavaScript

Unlock the Secrets of Range Loops: How Element Evaluation Affects Your Go Code | HackerNoon

Range loops in Go can cause bugs due to copying behavior with single variable reuse across iterations.
fromHackernoon
2 years ago
JavaScript

Code Smell 287 - Unused Local Assignment | HackerNoon

Avoid assigning values you never use to keep your code clean and maintainable.
fromHackernoon
3 years ago
JavaScript

Unlock the Secrets of Range Loops: How Element Evaluation Affects Your Go Code | HackerNoon

Range loops in Go can cause bugs due to copying behavior with single variable reuse across iterations.
more#debugging
fromnedbatchelder.com
4 months ago
Python

Testing some tidbits

Exploring diverse methods in Python for validating strings of zeros and ones emphasizes practical, varied coding strategies.
fromHackernoon
2 years ago
JavaScript

Web Scraping Optimization: Tips for Faster, Smarter Scrapers | HackerNoon

Advanced web scraping requires a shift from basic practices to more sophisticated strategies for scalability and long-term effectiveness.
fromCSS-Tricks
8 months ago
JavaScript

All About JavaScript Loops | CSS-Tricks

JavaScript has various loop types, each with unique functions suitable for different scenarios.
[ Load more ]