featured in #520
How to Avoid Breached Passwords
tl;dr: Cyber attackers have many ways to infiltrate your systems. Proper password protocols could help, but ensuring users follow them is difficult. Breaches can lead to costly lawsuits and damage reputations. Compromised passwords can also be reused to access user accounts. This tech paper explores the issue, offers solutions, and provides strategies to protect users and organizations.featured in #520
Unexpected Anti-Patterns For Engineering Leaders — Lessons From Stripe, Uber & Carta
- Will Larson tl;dr: “Anytime you apply a rule too universally, it turns into an anti-pattern.” The key to effective engineering leadership, Larson argues, lies in figuring out which scenarios are worth deliberately defying conventional logic, and when to simply follow the rules. “ Will discusses his tonics for the following anti-patterns: (1) Shying away from micromanagement. (2) Pushing back on flawed metrics. (3) Serving as the umbrella for your team.featured in #519
Signposting: How To Reduce Cognitive Load For Your Reader
- Wes Kao tl;dr: “Signposting is using key words, phrases, or an overall structure in your writing to signal what the rest of your post is about. This helps your reader quickly get grounded, so their brain doesn’t waste cycles wondering where you’re taking them.” Wes shares how to implement this when writing about complex ideas.featured in #518
The Developer’s Guide To User Management At Scale
tl;dr: When you’re building an application at scale, there’s a ton of features to consider around user management such as implementing sessions via cookies or JWT, supporting bot protection, and handling identity linking. And these only scratch the surface. This comprehensive guide covers all things related to authentication (Multi-Factor Auth, SSO, handling sessions), security (bot protections, authorization policies), and user flows (inviting new users, identity linking) that you need to keep in mind for your app.featured in #518
featured in #518
An Engineering Manager Challenge
- Ted Neward tl;dr: Ted shares his answer to the following interview question: "You're the tech lead and your team is getting stretched thin. You decide to add resources but you can afford 1 senior full-stack developer or 2 junior full-stack devs. Which do you choose and why?"featured in #518
Emotional Signposting: Why You Should Tell People How To Feel
- Wes Kao tl;dr: “If you share information that’s not obviously positive or negative, you must proactively tell people how they should feel. Give context to the information, data, or fact. If there’s even a slight chance your audience might benefit from the extra clues, I would consider using signposting. It’s super fast for you, and super helpful for them.” Wes shares examples.featured in #517
An Engineering Manager Challenge
- Ted Neward tl;dr: Ted shares his answer to the following interview question: "You're the tech lead and your team is getting stretched thin. You decide to add resources but you can afford 1 senior full-stack developer or 2 junior full-stack devs. Which do you choose and why?"featured in #517
The Developer's Guide To Notification System Tooling
- Chris Bell tl;dr: Chris covers: (1) The key components of a notification system and their relevant use cases. (2) An overview of the tools, frameworks, and services available when building a notification system. (3) How to put these together to make the right choice for your use case and product.featured in #517