Newest Questions

Filter by
Sorted by
Tagged with
-1 votes
0 answers
21 views

Why do we still create rest APIs? [closed]

I just started learning about the specification, but I still have some doubts about why GraphQL simply hasn't replaced REST since it was created. REST APIs are very inflexible and straightforward. ...
0 votes
0 answers
24 views

Measurement of performance of Lisp code [migrated]

I'm trying to discern how much performance gains I would achieve by converting Lisp (SBCL) code to assembly language. The time function on SBCL keeps giving counterintuitive results even for trivial ...
-1 votes
0 answers
39 views

Best architecture for looping audio playback on the web [closed]

Best architecture for looping audio playback on the web I'm building a simple web-based audio streaming system that continuously plays a long audio file (several hours in duration) in an infinite loop—...
1 vote
2 answers
83 views

API design: handling multiple user account types

I’m designing a REST API where a single person can hold multiple account types. For example, one person might have both a CareProvider and a CareSeeker account. Each account type can have its own ...
4 votes
3 answers
157 views

Does (possibly) failable destructor require to change invariant violation error handling?

First, I'd like to highlight my personal premise on error handling approaches in C++ (as it might be the source of confusion in the first place). C++ Standards, 2004 (Sutter, Aleksandrescu), item 68 ...
1 vote
1 answer
189 views

How to manage connection strings for CI/CD and local debugging that works for .NET Framework web apps and desktop apps?

We want CI/CD to inject the production connection string into a .NET Framework app.config during deployment. In source control, we only want test/staging DB connection strings. Developers should ...
2 votes
2 answers
256 views

Why do database protocols use fixed endianness instead of native server endianness?

Most database wire protocols mandate a specific byte order for multi-byte integers: PostgreSQL: big-endian (network byte order) MySQL: little-endian MongoDB: little-endian (BSON format) OracleDB: ...
4 votes
2 answers
362 views

Backup for an Android offline password manager

I am building an Android password management app, where passwords are locally kept for security reasons. The network endpoints are only for creating an account, email verifications etc. I want to ...
1 vote
3 answers
223 views

How can I introduce migration scripts to a team that has stopped using them?

In my working experience, I am into a situation in which the team has stopped using migration scripts for setting up the db. The team is fast paced focusing on business upon a 1-year old startup. ...
1 vote
1 answer
103 views

How Should Services and Presentation Layers Share Data in Web Applications?

Lately, I’ve been studying the fundamentals of Software Architecture for web applications, and I’m a bit unsure about how the data and presentation layers should interact. From what I understand, the ...
2 votes
2 answers
101 views

How to deal with a poorly documented AWS SQS feed for a security product API?

I’m integrating with the Ajax Enterprise API which exposes an AWS SQS feed for device events and notifications. The API documentation is here: Ajax Enterprise API Docs. Each SQS message supplies an ...
alstr's user avatar
  • 129
-2 votes
4 answers
336 views

Terminology for a case where the same algorithm produces different results during tests?

I'm testing writing 10 MB of data to a server. The expected result echoed back is 10485760 bytes. 160 writes of 65336 bytes. Approximately 1 of 5 tests I get back 10420224 bytes in the test. 65536 ...
1 vote
2 answers
118 views

Designing persistence guarantees in an ingestion pipeline with a non-customizable intermediary

I’m migrating a large volume of historical RRD data into a VictoriaMetrics cluster. By design, vminsert buffers and asynchronously forwards data to vmstorage. This makes it unclear when data is ...
3 votes
6 answers
653 views

Can a language be sound if it doesn't promise safety?

It is said that C's type system is unsound, which means that it has "false negatives", it tells the programmer everything is fine, but then the code fails at runtime. for example, "the ...
-4 votes
3 answers
203 views

Optimizing a "Transfer-Encoding: chunked" parser [closed]

I have written a parser for Transfer-Encoding: chunked requests over HTTP/1.1. Now I'm working on optimizing the code. This is the specification 7.1. Chunked Transfer Coding. The first optimization ...
2 votes
2 answers
155 views

How should multiple ViewModels communicate in a larger WPF MVVM application?

I’m working on a WPF MVVM application that has grown beyond just one or two User Controls. I now have multiple ViewModels that need to react to each other’s actions (e.g., selecting a customer in one ...
Sam's user avatar
Sam
  • 29
-2 votes
2 answers
135 views

Preventing duplicate customers from company entry vs mobile sign-in [closed]

We have a system where customers can be created in two ways: By a company — the customer belongs to that company and the company can edit their information. By a mobile user — the customer has a ...
2 votes
1 answer
125 views

Serving several external APIs in Django + Angular application

I'm working on a web-based app that uses Django and Angular. This app uses several external APIs to fetch environmental data from different monitoring networks. We then use these data to perform ...
-4 votes
2 answers
193 views

How to design a Transfer-Encoding: chunked parser of Uint8Array's in JavaScript? [closed]

I'm working on implementing parsing a series of Uint8Arrays that contain Transfer-Encoding: chunked data sent from the client using WHATWG Fetch over a single connection. For example, writing 1 MB ...
2 votes
2 answers
216 views

Is it a violation of the three-tier architecture if I inject one service into another inside the logic layer?

I am a beginner programmer with little experience in building complex applications. Currently I'm making a messenger using Python's FastAPI for the back-end. The main thing that I am trying to achieve ...
6 votes
6 answers
787 views

Good way to represent connectivity between nodes of tree (outside of tree hierarchy)?

I have a set of data carrier objects represented using vertices in a strict tree hierarchy. I also have the following requirements: some vertices should be "linked" to other vertices ...
2 votes
2 answers
113 views

When using Clean Code with Ports and Mappers: which layer declares the Entity (Aggregate) factory interface and which one implements it?

So I was reading Eric Evans DDD book and one point that was not clear to me is which Layer (in case of using Clean Code) should be reponsible to: define the interface contract for an Entity (...
-1 votes
1 answer
106 views

How to organize struct-based "methods" in C similar to object-oriented style? [closed]

So I was coding in C for a while now, getting used to language syntax and different styles. Implemented a couple of simple data structures, algorithms and tried my skills in making Minesweeper clone. ...
2 votes
7 answers
277 views

I'm looking for a design principle referring to using a system for it's intended purpose

Recently a junior team member was asked to use a survey tool to act as a system by which fuel delivery drivers could submit their Bill of Lading to our dispatch team for record collection after ...
1 vote
3 answers
421 views

Practicing DDD from the biggest modules to the smallest widgets

I have a frontend project using VueJS and TS and I structured it using DDD. So far, I have some modules (bounded contexts, domains - use the term you prefer) which are used in two ways: some modules ...
1 vote
3 answers
101 views

How should we design an IoT platform that handles dynamic device schemas and time-series ingestion at scale (100K writes/min)? [closed]

We’re a small dev team (3 full-stack web devs + 1 mobile dev) working on a B2B IoT monitoring platform for an industrial energy component manufacturer. Think: batteries, inverters, chargers. We have 3 ...
0 votes
1 answer
71 views

Best practices for serving encrypted files in Laravel?

I'm building a Laravel-based web application that functions as a personal online photo archive. Each user uploads and manages their own private collection of images. These images are encrypted at rest ...
2 votes
1 answer
271 views

Visibility between UML packages

I have been reading the book "OCUP 2 Certification Guide : Preparing for the OMG Certified UML 2. 5 Professional 2 Foundation Exam". Where-in I am unconvinced with the answer option provided ...
Nerdy's user avatar
  • 131
4 votes
3 answers
230 views

The applicability of functional core - imperative shell to a cli program which contains a wrapper around a binary

Not long ago while I was exploring for solutions to test without mocks I've found out about the functional core, imperative shell architecture. It sounds great, I also think that it would play nicely ...
3 votes
2 answers
276 views

"dimension" vs "extent", "axis" vs "dimension" - when should I use which term?

I'm defining a small API involving both uni-dimensional and multi-dimensional data. In addition to representing the data itself, I also have function/methods/operators for creating a new multi-...

15 30 50 per page
1
2 3 4 5
...
2145