Consistent hashing algorithm from the database design perspective as it's a frequent use case where DynamoDB and Apache Cassandra have implemented it.
Dodge the Have-I-Been-Pwned List! Passwords are used everywhere, yet many organisations fail to implement passwords properly. Here are the best practices according to OWASP.
Every action has to have a field note style paper trail. Or in our case a digital trail.
The platform is extensible by third-party add-ons where each add-on can be developed by an independent person or team published and consumed freely.
note: I wont be focusing on finding good project ideas or how to get funding, since I have no experience in this.
Setup of photoprism docker container using authentik identity provider. Including best practices and recommendations