Suppose you’re working on a software system and need to implement user-logins using a userID and password. After a bit of research, you narrow it down to two possible options. Your first option is to implement it yourself - hash/salt the password, store it in a database that you manage, and use it to authenticate … Continue reading The Law of Net Design Costs