Love to Code | React...ย โขย 10m
Hit an unexpected 'rate limit' message while creating Studio Ghibli-style images on ChatGPT? You weren't alone.This is a great example of API traffic management techniques like Rate Limiting and Throttling. โก๏ธRate Limiting - Sets a hard cap; requests are blocked ๐ซ once the limit is reached until the timer resets โ like being locked out after too many wrong password attempts. - Prevents abuse, ensures fair usage, and protects servers from overload. โก๏ธThrottling - Queues or delays excess requests โณ, processing them at a controlled pace. Queued requests may eventually be rejected if delayed too long. Example: Rate Limiting is like riding 5 rollercoasters max ๐ข, while Throttling slows the queue by pacing rides. OpenAI used both to prevent GPU overload and ensure availability. Why use these? โ Prevent DDoS attacks โ Avoid server crashes โ Ensure responsiveness for all users

Jack of all trades, ...ย โขย 3m
Day 11 of becoming System Design Pro Still wrapping my head around rate limiting Is it a scaling issue? Algorithmic? Max-thread problem? When we already have vertical scaling, load balancing, consistent hashing.. why rate limit at all? #LearnInPu
See MoreFull Stack Web Devel...ย โขย 28d
Reactive systems prioritize responsiveness, resilience and elasticity; a core challenge is back-pressureโcontrolling data flow so producers donโt overwhelm slower consumers. Techniques include buffering to smooth bursts, rate-limiting producers, prio
See MoreBe optimisticย โขย 10m
When I started freelancing, I thought success was simple: Send 100 Connection requests, & boom Clients would come flying in And I got a reality check in a month. Out of 100 requests, only 10 accepted, Out of 10, only 5 started conversation while C
See More
Full Stack Web Devel...ย โขย 7m
In the rapidly evolving digital landscape, APIs (Application Programming Interfaces) serve as essential connectors among software applications, enabling seamless communication between systems. However, their accessibility also makes them prime target
See MoreYour Partner in Web,...ย โขย 10d
Youโre about to ship. Before you do, check these from a security perspective. These are things that break products later. Authentication Hash passwords with bcrypt. Rate limit logins. 2FA for admins. Why: weak auth becomes stolen accounts once users
See MoreFounder of Friday AIย โขย 7m
๐ Should India Start Charging Fees for High-Value UPI Transactions? UPI is a world-class digital payments system โ fast, free, and inclusive. But there's a hidden cost: ๐ธ Infra cost of โน0.10โโน0.30 per transaction ๐ฆ Over โน1,000 crore/month just t
See MoreFounder | Agentic AI...ย โขย 4m
Fine-tune vs Prompt vs Context Engineering. Simple step-by-step breakdown for each approach. ๐๐ถ๐ป๐ฒ-๐ง๐๐ป๐ถ๐ป๐ด (๐ ๐ผ๐ฑ๐ฒ๐น-๐๐ฒ๐๐ฒ๐น ๐๐๐๐๐ผ๐บ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป) ๐๐น๐ผ๐: 1. Collect Data โ Gather domain-specific info (e.g., legal docs). 2. Sta
See More
Founder | Agentic AI...ย โขย 3m
4 different ways of training LLM's. I've given a simple detailed explanation below. 1.) ๐๐ฐ๐ฐ๐๐ฟ๐ฎ๐๐ฒ ๐๐ฎ๐๐ฎ ๐๐๐ฟ๐ฎ๐๐ถ๐ผ๐ป (๐๐๐ฒ๐ฝ-๐ฏ๐-๐๐๐ฒ๐ฝ) Prepares clean, consistent, and useful data so the model learns effectively. 1. Collect text
See More
Founder | Agentic AI...ย โขย 23d
Most people skip guardrails, their AI systems break. Iโve explained in a very simple way below. 1. ๐๐ป๐ฝ๐๐ & ๐ข๐๐๐ฝ๐๐ ๐๐๐ฎ๐ฟ๐ฑ๐ฟ๐ฎ๐ถ๐น๐ This is the ๐ฒ๐ป๐๐ฟ๐ ๐ฎ๐ป๐ฑ ๐ฒ๐ ๐ถ๐ ๐ฐ๐ต๐ฒ๐ฐ๐ธ of the system. โข User input is checked for safety โข
See More
Download the medial app to read full posts, comements and news.