Find answers to your questions about Software Engineering or help others by answering their Software Engineering questions.
I am designing architecture for service like pastebin.com. I plan to store user data on S3 storage and metadata with my own server. So whenever a user requests for some...
Asked on 10/29/2021
1 answerI always had problems in grasping the full benefits/motif behind using the Factory design pattern (for this post, I will stick to Factory Method pattern, specifically). True, there are (really)...
Asked on 10/29/2021
1 answerSome design thoughts on an application that is mostly event driven using kubernetes and docker. The application is a web based application, a single page one. It shows updates from...
Asked on 10/29/2021
1 answerConsider a desktop application that interacts with a web API, for which it needs a key. How should API keys be handled? Configuration files come to mind, however it doesn't...
Asked on 10/29/2021 by Al2110
3 answerWhen a deployment diagram shows an artifact deployed on a node (with either the deploy dependency arrow or one of the alternative way to draw the relationship).Does it mean that...
Asked on 10/29/2021
1 answerI want to make diagrams that explain how Inheritance and Polymorphism work conceptually. Assume that we have a Cat class that inherits from the Animal class. The way that I...
Asked on 10/29/2021
2 answerI had go through Jason Taylor's link. He mentioned thatThe Domain layer contains enterprise logic and types and the Application layer contains business logic and types. The...
Asked on 10/29/2021 by Nest
2 answerI've often found myself with the need to develop tools that process large files over a network and perform an operation to every element in that file. An element may...
Asked on 10/29/2021
5 answerI'm trying to learn how to implement a DAO design pattern (for a game, but this does not really matter). In my program, I have a database layer which has...
Asked on 10/29/2021
1 answerI don't understand why we hash data like passwords. I know it's harder to steal hashed data rather than just plain text, and it takes longer, but once one of...
Asked on 10/29/2021 by oh hello there
6 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP