Newest Questions

Filter by
Sorted by
Tagged with
2 votes
1 answer
35 views

I am trying to automate an old GUI tool which requires filling in some data from a CSV and selecting appropriate tree item values based on it. I need to do this in multiple instances of the ...
Yashbhatt's user avatar
  • 129
-2 votes
0 answers
30 views

I am designing a RAG architecture for a dataset of approximately 10 million text files (PostgreSQL), targeting ~100M vectors. The system requires semantic search and monthly incremental updates (add/...
Fatih Turk's user avatar
2 votes
4 answers
798 views

I was trying to model a fairly simple real world model inside a distributed system and got stuck thinking about timing and order and would appreciate some external view on it. Assuming I have this ...
Samuel's user avatar
  • 769
1 vote
1 answer
63 views

I'm working on a WPF application which has many user interactions which start with opening a non model window, allowing some interaction with the window and the rest of the application (think ...
LOul's user avatar
  • 11
2 votes
1 answer
79 views

I am working on a system of websites and am back to an age-old problem of how to group the content. In simplest terms, I am wanting to build something like a hierarchical organization of content, ...
Lance Pollard's user avatar
2 votes
4 answers
141 views

I'm developing a multithreaded game server (C/TCP). I need to send a list of 50-100 available games to a console client. Option A: Send 50-100 separate messages, using send() for every single ...
dok's user avatar
  • 311
-1 votes
1 answer
124 views

I have been learning a lot of new things lately, DevOps, Cloud Computing, Monitoring, and Security. I have been facing my problems dead on, but System Design seems to be a bit complicated. I have ...
Arthur's user avatar
  • 27
0 votes
2 answers
134 views

I am building an API project, where I have a controller called C1, which calls service S1. Within this service, there are multiple method invocations to services S2and S3 and S4, as well as a call to ...
Héctor Iglesias's user avatar
-1 votes
0 answers
45 views

I am implementing a multithreaded C server where clients are stored in a linked list of structs. Each struct contains, among other fields, the socket (sk) for communicating with the client. The list ...
dok's user avatar
  • 311
9 votes
6 answers
2k views

I'm looking for a name or attempts to document a particular thought patten used by most experienced engineers when they debug. Most experienced engineers develop a sense of hierarchy for what is ...
Philip Couling's user avatar
5 votes
5 answers
581 views

Imagine I have a function like this (written in Java): void sayHello(String firstName, String lastName) { if (firstName == null) { throw new IllegalArgumentException("first name is ...
J-bob's user avatar
  • 357
3 votes
2 answers
219 views

I'm building a web app using Spring Boot (backend) and React (frontend). My authentication is based on JWT, with both access token and refresh token. The refresh token is stored in an HTTP-only ...
Conquer the world's user avatar
1 vote
4 answers
156 views

I'm working on a Spring Boot application with a VoucherService and VoucherController. I currently have the service method return an ApiResponse<T> directly, like this: @Transactional public ...
Conquer the world's user avatar
1 vote
2 answers
241 views

I'm designing an application that is going to receive tens to hundreds of thousands of requests. Users submit requests on behalf of Customers (which are singular persons). Each request will contain ...
Joe Ireland's user avatar
3 votes
0 answers
116 views

I am in the process of writing my own software renderer. I am currently working on setting up a shader system that allows users of the renderer to create their own Vertex Shader and Fragment Shader. ...
PiastriTheBottler's user avatar
1 vote
1 answer
128 views

I’m implementing the authentication module in a modular monolith built with NestJS. Initial Draft In the first draft, the User entity included the hashed password, refresh token, and refresh token ...
captncrunch's user avatar
1 vote
1 answer
335 views

Where I work, they have never implemented web APIs. At my previous job, which I left 11 years ago, I would write several web APIs to be used for applications, reports, etc. So when I came to this job ...
Rod's user avatar
  • 173
1 vote
2 answers
166 views

I’m writing a multiplayer server in C using sockets and pthreads. The project is separated by responsibility: server.c/.h → networking (socket, bind, listen, accept, thread creation) player.c/.h → ...
dok's user avatar
  • 311
1 vote
2 answers
145 views

I’m writing a multiplayer server in C using sockets and pthreads. The project is separated by responsibility: server.c/.h → networking (socket, bind, listen, accept, thread creation) player.c/.h → ...
dok's user avatar
  • 311
1 vote
2 answers
87 views

I have a graph: undirected, unweighted, no leaves, no disconnected edges or vertices. The graph is populated with vertices of 3 types: A, B, C. Let's say, I hold a vertex of type A, denoted as A0. I ...
BorisV's user avatar
  • 119
1 vote
1 answer
106 views

I’m working on a three layers architecture backend (Laravel). Here’s the context: I have a PasswordService responsible for updating a user’s password. and a Otpservice responsible for verifying/...
aymen's user avatar
  • 21
6 votes
2 answers
1k views

Since I started studying security in web applications, it seems that everyone always says to never store sensitive information (e.g., refresh tokens, access tokens, and so on) due to the risk of ...
ikiwq's user avatar
  • 165
3 votes
3 answers
1k views

I’m developing a system with separate front-end and back-end components: The back-end is already implemented with Node.js and Express, exposing REST APIs. The front-end must be a private SPA, ...
dok's user avatar
  • 311
-1 votes
0 answers
23 views

In our website, we see many crawlers which pretends like human trying get contents. These crawlers are not well known like Google/Bing/Facebook etc. I can identify those crawler's IP and they are ...
Pakira's user avatar
  • 99
-1 votes
2 answers
214 views

We need to do the front-end with spa. The question is whether to use a full-stack framework like next.js, but only the front-end part, without server-side components. If I don't use them, could these ...
dok's user avatar
  • 311
2 votes
2 answers
148 views

In PHP, trim() exists. By default the second parameter is " \n\r\t\v\x00" I wish to introduce my own version which doesn't deviate far from the core functionality: // Trim whitespace in ...
MonkeyZeus's user avatar
0 votes
0 answers
106 views

I'm using SDL2 in my game engine and have created custom event types that use the data from SDL_Event. This works well within my own code, but it becomes problematic with ImGui (and other libraries ...
steamdog's user avatar
4 votes
0 answers
111 views

LGPL has certain requirements for software that uses LGPL libraries. The most common way to satisfy these in otherwise closed-source software is to supply the LGPL library as a dynamic library, which ...
hyde's user avatar
  • 3,804
13 votes
5 answers
2k views

I'm currently analyzing a process that is considered too slow. In summary, it's a task that loads a lot of data from Microsoft SQL Server, performs some basic stuff on it, and creates a report. It ...
Arseni Mourzenko's user avatar
0 votes
2 answers
111 views

I’m building a modular REST API using Node.js + Express + TypeScript. My controllers are defined as classes. In my route files, I currently create a new controller instance, like this: import { Router ...
dok's user avatar
  • 311
1 vote
3 answers
379 views

I have an application with very strict requirements around auditing and the "replayability" of user actions. For this reason, I've chosen an event-sourced architecture because of its append-...
user2864874's user avatar
1 vote
1 answer
222 views

I'm learning Domain-Driven Design (DDD) and studying different architecture patterns, and I’ve come across two seemingly conflicting design philosophies around domain modeling. 1. Rich Domain Model ...
Penchala Yegu's user avatar
-2 votes
0 answers
80 views

I've just opened a relatively similar question (why nobody indents Bash?) on Stack Overflow. What I'm asking here is whether do you think the facts there is no type enforcing; there is no indentation ...
Scrooge McDuck's user avatar
0 votes
2 answers
186 views

I have a Python class called FunctionsManager; its __init__() method is the following: class FunctionsManager: def __init__(self, instance_class1, instance_class2, ..., instance_classN): ...
User051209's user avatar
0 votes
1 answer
84 views

I've been working on an implementation of a service, and have found that there are a number of operations where I need to read from a database to provide a caller with certain data or objects. In-line ...
Lily Smith's user avatar
7 votes
3 answers
546 views

The Java List<E> interface includes methods, such as add(E) and remove(Object), that work as the names suggest on instances of mutable concrete implementations, such as ArrayList<E> and ...
Ellen Spertus's user avatar
1 vote
1 answer
81 views

I've had reasons to design an application that should 1) run in the background to show status and notifications, with 2) dialogs showing details and configuring the app through more powerful widgets. ...
Andreas's user avatar
  • 317
7 votes
3 answers
387 views

I'm working on a program that runs as a sort of plugin to the Windows UAC prompt (and other similarly difficult environments). The testing situation is a bit abysmal. End-to-end tests are not possible,...
jetm's user avatar
  • 81
3 votes
4 answers
414 views

I am tasked with implementing authentication and authorization in a distributed environment, so I plan to use JWT. I get how authorization works with JWT - if the token is not expired, and the ...
dzenesiz's user avatar
  • 199
1 vote
2 answers
235 views

I'm in charge of developing an application that sometimes needs to process massive amounts of data from a Greenplum (a PostgreSQL-derived) database. The process involves a Java 8 program running on a ...
Meztlicoatl's user avatar
1 vote
2 answers
49 views

We're developing an anomaly detection web app as a Capstone Project, and we're currently revising our manuscript. In our last capstone defense, one of our panelists mentioned that the data stores in ...
Bronwyn Rojas's user avatar
2 votes
1 answer
256 views

I’m designing a backend in TypeScript (could also apply to JavaScript), and I’m wondering about the architectural approach. Is it better to stick to a single paradigm (e.g., fully object-oriented or ...
dok's user avatar
  • 311
2 votes
3 answers
183 views

Say I have the following header #ifndef WINDOW_HPP #define WINDOW_HPP // includes... namespace window { struct Window { GLFWwindow *handle = nullptr; }; struct ...
user avatar
0 votes
2 answers
195 views

I am doing the frontend for a Java Spring backend. The project uses JavaFX for the front but I a migrating it for web usage (with VueJS). When I make an API call to retrieve an object, I am receiving ...
Bernardo Benini Fantin's user avatar
0 votes
2 answers
91 views

I am learning backend development by building a simple URL shortener project. My goal is to learn backend concepts and try to do things in simple but better ways, keeping scalability and reliability ...
Venkataramana Pai K's user avatar
2 votes
1 answer
204 views

When we write the "Purpose" section of a SRS document, do we write: The document purpose? or The Software to-be-built purpose? I have checked some examples and it seems the first one but ...
KansaiRobot's user avatar
1 vote
1 answer
128 views

I am currently rethinking my API response schema and caching strategy while implementing ETag-based caching for a paginated REST API (for example, listing places). Each paginated response looks like ...
Meds's user avatar
  • 19
-3 votes
1 answer
182 views

Is there a name for this anti-pattern? A reference to a class member is being passed to another class method, rather than having the class method set the class member directly. public class ...
Jeff Roe's user avatar
2 votes
3 answers
254 views

I’m modeling a use case diagram for an online marketplace system. In one of my use cases, the seller can perform three different actions: Accept an offer → closes the negotiation, Reject an offer → ...
dok's user avatar
  • 311
5 votes
3 answers
646 views

How much auto is too much when creating utility functions in C++? Here's an example. I have a Qt application where, at some point, I need to find what is the maximum value among the integers that are ...
Arseni Mourzenko's user avatar

15 30 50 per page
1
2 3 4 5
1288