JavaScript两行的工作队列
A job queue in two lines of JavaScript

原始链接: https://jameshfisher.com/2025/07/07/a-job-queue-in-two-lines-of-js/

提供的文本列表博客文章,只有一个(第一个)与JavaScript有关。这是关注JavaScript点运算符的摘要,包括与安全漏洞有关的博客文章。 JavaScript帖子讨论了点运算符(“。”),并涵盖了三个常见用途:访问属性(foo.bar`),调用方法(foo.bar()`),并将值分配给属性(`foo.bar = baz')。该点是JavaScript面向对象的性质的核心,包括原型继承,其中属性和方法是从父对象继承的。它还涉及控制属性访问和修改的特殊功能,涉及到Getters和setter。 其他突出显示的帖子涵盖了各种安全漏洞,包括Android上的“涂片网络钓鱼”(从任何联系人中显示SMS),“ Inpection Bar”网络钓鱼方法使用Chrome Mobile中的假URL栏,以及利用Gmail的“ DOTS DOTS DOTS”功能来送达骗局。

黑客新闻讨论围绕2行JavaScript职位队列实施。一位评论者引起了人们对由于束缚的承诺结构而导致潜在记忆泄漏的担忧,从而导致高通量场景中的垃圾收集压力。其他人则辩论这一点,认为解决的诺言应该是垃圾收集的,并且拨款开销很少。 一些建议的替代方法,例如使用`链。给定类型的注释,原始代码中的打字稿类型注释还引发了关于它是否可以真正称为“ 2行JavaScript”解决方案的辩论。最后,一些用户建议使用更强大的排队库(例如BullMQ)进行生产应用程序,尤其是在需要持久性和高级功能时,同时确认前端应用程序中简单的,非经验的队列的用例以确保顺序执行。
相关文章

原文

What does the dot do in JavaScript?

foo.bar, foo.bar(), or foo.bar = baz - what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01

Smear phishing: a new Android vulnerability

Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06

A probabilistic pub quiz for nerds

A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26

Time is running out to catch COVID-19

Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14

The inception bar: a new phishing method

A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27

The hacker hype cycle

I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23

Project C-43: the lost origins of asymmetric crypto

Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16

How Hacker News stays interesting

Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26

My parents are Flat-Earthers

For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20

The dots do matter: how to scam a Gmail user

Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07

The sorry state of OpenSSL usability

OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02

I hate telephones

I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08

The Three Ts of Time, Thought and Typing: measuring cost on the web

Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26

Granddad died today

Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19

How do I call a program in C, setting up standard pipes?

A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17

Your syntax highlighter is wrong

Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11

联系我们 contact @ memedata.com