Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I kind of feel that using examples where idempotent keys are implemented in a SAAS in a engine is side stepping the issue not because NIH (it’s the right thing to do) but it glosses over the complexity of implementing idempotency for the part you need to yourself , and I’ll bet most people have a kinda promise to be idempotent unless edge case


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: