Newest Questions

Filter by
Sorted by
Tagged with
1 vote
3 answers
381 views

I have an application with very strict requirements around auditing and the "replayability" of user actions. For this reason, I've chosen an event-sourced architecture because of its append-...
1 vote
1 answer
224 views

I'm learning Domain-Driven Design (DDD) and studying different architecture patterns, and I’ve come across two seemingly conflicting design philosophies around domain modeling. 1. Rich Domain Model ...
-2 votes
0 answers
80 views

I've just opened a relatively similar question (why nobody indents Bash?) on Stack Overflow. What I'm asking here is whether do you think the facts there is no type enforcing; there is no indentation ...
0 votes
2 answers
189 views

I have a Python class called FunctionsManager; its __init__() method is the following: class FunctionsManager: def __init__(self, instance_class1, instance_class2, ..., instance_classN): ...
0 votes
1 answer
86 views

I've been working on an implementation of a service, and have found that there are a number of operations where I need to read from a database to provide a caller with certain data or objects. In-line ...
7 votes
3 answers
549 views

The Java List<E> interface includes methods, such as add(E) and remove(Object), that work as the names suggest on instances of mutable concrete implementations, such as ArrayList<E> and ...
1 vote
1 answer
81 views

I've had reasons to design an application that should 1) run in the background to show status and notifications, with 2) dialogs showing details and configuring the app through more powerful widgets. ...
7 votes
3 answers
387 views

I'm working on a program that runs as a sort of plugin to the Windows UAC prompt (and other similarly difficult environments). The testing situation is a bit abysmal. End-to-end tests are not possible,...
jetm's user avatar
  • 81
3 votes
4 answers
416 views

I am tasked with implementing authentication and authorization in a distributed environment, so I plan to use JWT. I get how authorization works with JWT - if the token is not expired, and the ...
1 vote
2 answers
244 views

I'm in charge of developing an application that sometimes needs to process massive amounts of data from a Greenplum (a PostgreSQL-derived) database. The process involves a Java 8 program running on a ...
1 vote
2 answers
52 views

We're developing an anomaly detection web app as a Capstone Project, and we're currently revising our manuscript. In our last capstone defense, one of our panelists mentioned that the data stores in ...
2 votes
1 answer
259 views

I’m designing a backend in TypeScript (could also apply to JavaScript), and I’m wondering about the architectural approach. Is it better to stick to a single paradigm (e.g., fully object-oriented or ...
2 votes
3 answers
190 views

Say I have the following header #ifndef WINDOW_HPP #define WINDOW_HPP // includes... namespace window { struct Window { GLFWwindow *handle = nullptr; }; struct ...
user avatar
0 votes
2 answers
197 views

I am doing the frontend for a Java Spring backend. The project uses JavaFX for the front but I a migrating it for web usage (with VueJS). When I make an API call to retrieve an object, I am receiving ...
0 votes
2 answers
92 views

I am learning backend development by building a simple URL shortener project. My goal is to learn backend concepts and try to do things in simple but better ways, keeping scalability and reliability ...

15 30 50 per page
1 2
3
4 5
...
4293