Freelance Footprints

From tips and tricks to coding tutorials, follow footprints through the snow of technology and software engineering. Written by a Freelance Software Engineer.

The hottest Substack posts of Freelance Footprints

And their main takeaways
8 HN points 20 Feb 24
  1. The leaky bucket algorithm helps manage the rate of requests a web application can handle. It uses the idea of a bucket that can fill up and overflow if too many requests come in at once.
  2. In this algorithm, there are two key settings: the maximum number of requests allowed at a time and the rate at which requests are processed. This controls how quickly requests are dealt with and prevents overload.
  3. The leaky bucket algorithm is widely used in tech, such as by companies like SeatGeek for their waiting room systems, to ensure smooth user experiences without exceeding server limits.
2 HN points 16 Jan 24
  1. Implementing password reset in an app is a common but important feature.
  2. Key requirements include allowing users to reset their password, ensuring one-time use reset links, and avoiding database alterations.
  3. Standard steps in implementing password reset involve creating forms, generating unique tokens for links, and handling password change requests.