Newest Questions

Filter by
Sorted by
Tagged with
-1 votes
3 answers
95 views

The reason I wanted to ask is because of some code from Undertale that is responsible for choosing which dialogue set to use. It works something like this: switch (id) { case 0: msg[0] = &...
Bunabyte's user avatar
  • 657
0 votes
1 answer
140 views

I'm developing a library in JavaScript (TypeScript, actually) which is split into several modules. It's meant to run both on the web and in non-web environments like Node.js. The library is meant to ...
Blue Nebula's user avatar
0 votes
1 answer
28 views

I’m working on a Physical DFD Level 1 and 2 for an anomaly detection app, but this this post only concerns the DFD’s user-account processes. I want to check if my decomposition of a specific process ...
Bronwyn Rojas's user avatar
5 votes
5 answers
388 views

I'm working on a platform that allows assigning users to events manually. Every user provides their general availability (Mondays 2PM - 8PM, Tuesdays not at all, Wednesdays 3:30PM-7PM, and so on). ...
Ray's user avatar
  • 159
1 vote
1 answer
217 views

I am working on an identity and users service in a microservices system for which a passwordless, SMS-based authentication is a hard requirement, i.e. User enters their phone number System sends the ...
dzenesiz's user avatar
  • 227
3 votes
2 answers
130 views

I am trying to automate an old GUI tool which requires filling in some data from a CSV and selecting appropriate tree item values based on it. I need to do this in multiple instances of the ...
Yashbhatt's user avatar
  • 139
5 votes
3 answers
1k views

I was trying to model a fairly simple real world model inside a distributed system and got stuck thinking about timing and order and would appreciate some external view on it. Assuming I have this ...
Samuel's user avatar
  • 799
4 votes
1 answer
111 views

I'm working on a WPF application which has many user interactions which start with opening a non model window, allowing some interaction with the window and the rest of the application (think ...
LOul's user avatar
  • 41
2 votes
1 answer
102 views

I am working on a system of websites and am back to an age-old problem of how to group the content. In simplest terms, I am wanting to build something like a hierarchical organization of content, ...
Lance Pollard's user avatar
2 votes
4 answers
175 views

I'm developing a multithreaded game server (C/TCP). I need to send a list of 50-100 available games to a console client. Option A: Send 50-100 separate messages, using send() for every single ...
dok's user avatar
  • 313
-1 votes
1 answer
157 views

I have been learning a lot of new things lately, DevOps, Cloud Computing, Monitoring, and Security. I have been facing my problems dead on, but System Design seems to be a bit complicated. I have ...
Arthur's user avatar
  • 27
0 votes
2 answers
151 views

I am building an API project, where I have a controller called C1, which calls service S1. Within this service, there are multiple method invocations to services S2and S3 and S4, as well as a call to ...
Héctor Iglesias's user avatar
10 votes
6 answers
2k views

I'm looking for a name or attempts to document a particular thought patten used by most experienced engineers when they debug. Most experienced engineers develop a sense of hierarchy for what is ...
Philip Couling's user avatar
5 votes
5 answers
617 views

Imagine I have a function like this (written in Java): void sayHello(String firstName, String lastName) { if (firstName == null) { throw new IllegalArgumentException("first name is ...
J-bob's user avatar
  • 357
3 votes
1 answer
257 views

I'm building a web app using Spring Boot (backend) and React (frontend). My authentication is based on JWT, with both access token and refresh token. The refresh token is stored in an HTTP-only ...
Conquer the world's user avatar
1 vote
4 answers
170 views

I'm working on a Spring Boot application with a VoucherService and VoucherController. I currently have the service method return an ApiResponse<T> directly, like this: @Transactional public ...
Conquer the world's user avatar
1 vote
2 answers
255 views

I'm designing an application that is going to receive tens to hundreds of thousands of requests. Users submit requests on behalf of Customers (which are singular persons). Each request will contain ...
Joe Ireland's user avatar
3 votes
0 answers
118 views

I am in the process of writing my own software renderer. I am currently working on setting up a shader system that allows users of the renderer to create their own Vertex Shader and Fragment Shader. ...
PiastriTheBottler's user avatar
1 vote
1 answer
135 views

I’m implementing the authentication module in a modular monolith built with NestJS. Initial Draft In the first draft, the User entity included the hashed password, refresh token, and refresh token ...
captncrunch's user avatar
1 vote
1 answer
340 views

Where I work, they have never implemented web APIs. At my previous job, which I left 11 years ago, I would write several web APIs to be used for applications, reports, etc. So when I came to this job ...
Rod's user avatar
  • 173
1 vote
2 answers
170 views

I’m writing a multiplayer server in C using sockets and pthreads. The project is separated by responsibility: server.c/.h → networking (socket, bind, listen, accept, thread creation) player.c/.h → ...
dok's user avatar
  • 313
1 vote
2 answers
149 views

I’m writing a multiplayer server in C using sockets and pthreads. The project is separated by responsibility: server.c/.h → networking (socket, bind, listen, accept, thread creation) player.c/.h → ...
dok's user avatar
  • 313
1 vote
2 answers
89 views

I have a graph: undirected, unweighted, no leaves, no disconnected edges or vertices. The graph is populated with vertices of 3 types: A, B, C. Let's say, I hold a vertex of type A, denoted as A0. I ...
BorisV's user avatar
  • 119
1 vote
1 answer
117 views

I’m working on a three layers architecture backend (Laravel). Here’s the context: I have a PasswordService responsible for updating a user’s password. and a Otpservice responsible for verifying/...
aymen's user avatar
  • 23
6 votes
2 answers
1k views

Since I started studying security in web applications, it seems that everyone always says to never store sensitive information (e.g., refresh tokens, access tokens, and so on) due to the risk of ...
ikiwq's user avatar
  • 165
3 votes
3 answers
1k views

I’m developing a system with separate front-end and back-end components: The back-end is already implemented with Node.js and Express, exposing REST APIs. The front-end must be a private SPA, ...
dok's user avatar
  • 313
-1 votes
0 answers
23 views

In our website, we see many crawlers which pretends like human trying get contents. These crawlers are not well known like Google/Bing/Facebook etc. I can identify those crawler's IP and they are ...
Pakira's user avatar
  • 99
-1 votes
2 answers
226 views

We need to do the front-end with spa. The question is whether to use a full-stack framework like next.js, but only the front-end part, without server-side components. If I don't use them, could these ...
dok's user avatar
  • 313
2 votes
2 answers
151 views

In PHP, trim() exists. By default the second parameter is " \n\r\t\v\x00" I wish to introduce my own version which doesn't deviate far from the core functionality: // Trim whitespace in ...
MonkeyZeus's user avatar
14 votes
5 answers
3k views

I'm currently analyzing a process that is considered too slow. In summary, it's a task that loads a lot of data from Microsoft SQL Server, performs some basic stuff on it, and creates a report. It ...
Arseni Mourzenko's user avatar
0 votes
2 answers
112 views

I’m building a modular REST API using Node.js + Express + TypeScript. My controllers are defined as classes. In my route files, I currently create a new controller instance, like this: import { Router ...
dok's user avatar
  • 313
1 vote
3 answers
382 views

I have an application with very strict requirements around auditing and the "replayability" of user actions. For this reason, I've chosen an event-sourced architecture because of its append-...
user2864874's user avatar
1 vote
1 answer
227 views

I'm learning Domain-Driven Design (DDD) and studying different architecture patterns, and I’ve come across two seemingly conflicting design philosophies around domain modeling. 1. Rich Domain Model ...
Penchala Yegu's user avatar
0 votes
2 answers
190 views

I have a Python class called FunctionsManager; its __init__() method is the following: class FunctionsManager: def __init__(self, instance_class1, instance_class2, ..., instance_classN): ...
User051209's user avatar
0 votes
1 answer
87 views

I've been working on an implementation of a service, and have found that there are a number of operations where I need to read from a database to provide a caller with certain data or objects. In-line ...
Lily Smith's user avatar
7 votes
3 answers
552 views

The Java List<E> interface includes methods, such as add(E) and remove(Object), that work as the names suggest on instances of mutable concrete implementations, such as ArrayList<E> and ...
Ellen Spertus's user avatar
1 vote
1 answer
82 views

I've had reasons to design an application that should 1) run in the background to show status and notifications, with 2) dialogs showing details and configuring the app through more powerful widgets. ...
Andreas's user avatar
  • 317
7 votes
3 answers
389 views

I'm working on a program that runs as a sort of plugin to the Windows UAC prompt (and other similarly difficult environments). The testing situation is a bit abysmal. End-to-end tests are not possible,...
jetm's user avatar
  • 81
3 votes
4 answers
418 views

I am tasked with implementing authentication and authorization in a distributed environment, so I plan to use JWT. I get how authorization works with JWT - if the token is not expired, and the ...
dzenesiz's user avatar
  • 227
1 vote
2 answers
254 views

I'm in charge of developing an application that sometimes needs to process massive amounts of data from a Greenplum (a PostgreSQL-derived) database. The process involves a Java 8 program running on a ...
Meztlicoatl's user avatar
1 vote
2 answers
61 views

We're developing an anomaly detection web app as a Capstone Project, and we're currently revising our manuscript. In our last capstone defense, one of our panelists mentioned that the data stores in ...
Bronwyn Rojas's user avatar
2 votes
1 answer
261 views

I’m designing a backend in TypeScript (could also apply to JavaScript), and I’m wondering about the architectural approach. Is it better to stick to a single paradigm (e.g., fully object-oriented or ...
dok's user avatar
  • 313
2 votes
3 answers
191 views

Say I have the following header #ifndef WINDOW_HPP #define WINDOW_HPP // includes... namespace window { struct Window { GLFWwindow *handle = nullptr; }; struct ...
user avatar
0 votes
2 answers
204 views

I am doing the frontend for a Java Spring backend. The project uses JavaFX for the front but I a migrating it for web usage (with VueJS). When I make an API call to retrieve an object, I am receiving ...
Bernardo Benini Fantin's user avatar
0 votes
2 answers
93 views

I am learning backend development by building a simple URL shortener project. My goal is to learn backend concepts and try to do things in simple but better ways, keeping scalability and reliability ...
Venkataramana Pai K's user avatar
2 votes
1 answer
206 views

When we write the "Purpose" section of a SRS document, do we write: The document purpose? or The Software to-be-built purpose? I have checked some examples and it seems the first one but ...
KansaiRobot's user avatar
1 vote
1 answer
132 views

I am currently rethinking my API response schema and caching strategy while implementing ETag-based caching for a paginated REST API (for example, listing places). Each paginated response looks like ...
Meds's user avatar
  • 19
-3 votes
1 answer
185 views

Is there a name for this anti-pattern? A reference to a class member is being passed to another class method, rather than having the class method set the class member directly. public class ...
Jeff Roe's user avatar
2 votes
3 answers
259 views

I’m modeling a use case diagram for an online marketplace system. In one of my use cases, the seller can perform three different actions: Accept an offer → closes the negotiation, Reject an offer → ...
dok's user avatar
  • 313
5 votes
3 answers
653 views

How much auto is too much when creating utility functions in C++? Here's an example. I have a Qt application where, at some point, I need to find what is the maximum value among the integers that are ...
Arseni Mourzenko's user avatar

15 30 50 per page
1
2 3 4 5
1288