Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

Over the top auth strategies (Friends)

1923.53 - 1943.041 Adam

This process previously relied heavily on cron jobs and background jobs and cues, and the design worked well. However, these jobs were difficult to debug at scale because they needed more controls and more observability. And as they looked to rethink this ingestion flow, they wanted to avoid cron jobs, background jobs, cues.

0
💬 0

Comments

There are no comments yet.

Log in to comment.