Search results
11 resultsSecure Coding — OWASP Top 10 for Backend Engineers
Injection, broken auth, XSS, IDOR, and how to prevent each.
REST API design principles we follow
Versioning, error formats, pagination, and auth patterns used across all Intersysop-built APIs.
Privacy-First Data Design — PII Handling Patterns
Tokenisation, pseudonymisation, encryption at rest, and right-to-deletion workflows.
JWT Authentication — Implementation and Security Patterns
Access tokens, refresh tokens, rotation, revocation, and common mistakes.
Fix Monitor or Laptop Screen Flickering
Identify whether flickering is caused by the cable, driver, refresh rate, or hardware.
Logging Best Practices for Production Services
Structured logging, log levels, correlation IDs, and log aggregation.
Materialised Views — When and How to Use Them
Incremental refresh, use cases, and implementation across Postgres, Snowflake, and dbt.
OAuth 2.0 and OIDC — Implementing Secure Third-Party Auth
Authorization code flow, PKCE, scopes, and integrating with identity providers.
Elasticsearch Indexing Strategy and Performance
Mapping, sharding, bulk indexing, and query optimization for Elasticsearch.
Set Up Dual Monitors in Windows
Connect, configure, and troubleshoot a two-monitor setup.
Implementing Rate Limiting in APIs
Token bucket, sliding window, fixed window — algorithms and implementation patterns.