Payload Logo

Search

Untitled category

Consistent hashing algorithm from the database design perspective as it's a frequent use case where DynamoDB and Apache Cassandra have implemented it.

Untitled category

Dodge the Have-I-Been-Pwned List! Passwords are used everywhere, yet many organisations fail to implement passwords properly. Here are the best practices according to OWASP.

No image
Untitled category

The platform is extensible by third-party add-ons where each add-on can be developed by an independent person or team published and consumed freely.