Created on 10th January 2024
•
The Hostel Mess Food Wastage Reduction Web App addresses the prevalent issue of food wastage in student hostels. Beyond optimizing meal planning and reducing waste, the app introduces features that empower students to actively manage their meal consumption and participate in food donation initiatives.
Personal Meal Tracking:
Meal Donation Integration:
Donation Tracking:
Notification System:
Personalized Meal Management:
Contribution to Social Causes:
Reduced Food Wastage:
By tracking skipped meals and facilitating donations, the app contributes to the overall reduction of food wastage in the hostel mess.
One significant hurdle we encountered was integrating the food donation API seamlessly into our web app. The API's documentation was somewhat unclear, and we initially struggled with authentication issues and data transmission inconsistencies. To overcome this, we carefully revisited the API documentation, reached out to the API provider's support, and engaged in trial-and-error testing. Ultimately, we successfully established a reliable connection by refining our authentication approach and ensuring proper data formatting.
Ensuring the web app's compatibility across various browsers posed a challenge. We noticed discrepancies in the rendering of certain elements and functionalities on Internet Explorer and older versions of Safari. To address this, we employed browser compatibility tools to identify specific issues and adjusted our CSS and JavaScript accordingly. Regular testing across multiple browsers and versions became a standard part of our development workflow to prevent compatibility issues from arising.
As the web app involves handling sensitive user data, ensuring robust data security measures became a top priority. During the development phase, we identified potential vulnerabilities in our initial implementation, such as insufficient encryption for certain data transmissions. To enhance security, we implemented end-to-end encryption for user data, conducted thorough security audits, and consulted with cybersecurity experts to fortify our system against potential threats.
Tracks Applied (2)
Technologies used