Anna

238 posts

Anna banner
Anna

Anna

@dung_phan12js

🇺🇸

New York, USA Katılım Ocak 2017
1.1K Takip Edilen28 Takipçiler
Anna retweetledi
Andrey Superior
Andrey Superior@andreysuperior·
Most people see a street. He sees $300-600 per block. A 24-year-old from Chengdu figured out that every hotel, every apartment, every commercial space within walking distance is an untapped asset. One nobody has packaged yet. He straps a rig to his back, walks in, spends twenty minutes scanning the space, and leaves with a file that lets anyone on earth stand inside that room from their couch. The client pastes a link on their booking page. Guests tour the property before they arrive. Cancellations drop. Reviews go up. He gets paid $400 for the scan. $99 every month for hosting. The technology: 3D Gaussian Splatting. Free on GitHub since 2023. The app: Luma AI. Also free. The page he delivers: built by Claude in ten minutes. Total tool cost: $20/month. Month one: $3,500. Month six: $18,000. The streets haven't changed. He just started charging for them.
Andrey Superior@andreysuperior

x.com/i/article/2052…

English
309
1.4K
12.9K
9.7M
Anna retweetledi
Nitin.nn
Nitin.nn@NitinthisSide_·
🧵 Day 26/30 — #SystemDesign Retries seem harmless. An API fails → retry the request. Still fails → retry again. Simple… until thousands of servers start retrying together and accidentally take the entire system down. That’s why production systems use Retry Strategies with Exponential Backoff instead of blind retries. A retry mechanism helps recover from temporary failures like: → Network instability → Timeout issues → Short server overloads → Rate limiting But retrying instantly creates traffic spikes during failures. Exponential backoff solves this by increasing delay after every failed attempt. Example: → Retry 1 → wait 1s → Retry 2 → wait 2s → Retry 3 → wait 4s → Retry 4 → wait 8s This gives systems time to recover instead of getting overwhelmed. Modern systems also add Jitter (randomness in delay) so millions of clients don’t retry at the exact same moment. Without jitter: → Retry storm → Traffic spikes → Cascading failures With jitter: → Requests spread naturally → Better recovery behavior → More stable systems That’s why companies like AWS, Google, Stripe, and Netflix heavily recommend exponential backoff patterns in distributed systems. Retries improve resilience. Uncontrolled retries destroy resilience. #30DaysOfSystemDesign #DistributedSystems #BackendEngineering
Nitin.nn tweet media
Nitin.nn@NitinthisSide_

🧵 Day 25/30 — #SystemDesign Authentication and Authorization sound similar, but they solve completely different problems in backend systems. Authentication answers: “Who are you?” The system verifies identity using passwords, OTPs, sessions, JWTs, OAuth, biometrics, etc. Authorization answers: “What are you allowed to do?” After login, the system checks permissions, roles, and access levels before allowing actions like deleting users, accessing admin routes, viewing private data, or triggering payments. ⸻ A user can be authenticated but still not authorized. Example: You log into Netflix successfully → Authentication ✅ Trying to access Netflix admin dashboard → Authorization ❌ This distinction becomes critical in production systems because bad authorization design can expose sensitive data even when authentication is secure. Modern systems often use: → JWT / Sessions for authentication → RBAC (Role-Based Access Control) for authorization → OAuth for third-party identity access → Middleware/API Gateways for permission enforcement ⸻ Real companies implement authorization very deeply: → Google Docs controls document-level permissions → AWS IAM manages cloud access policies → GitHub controls repo/team permissions → Banking apps enforce strict action-based authorization Authentication gets users into the system. Authorization decides what power they actually have inside it. #30DaysOfSystemDesign #Authentication #BackendEngineering

English
6
45
216
27K
Anna
Anna@dung_phan12js·
@CodeWithAmann Java + Spring and .NET are great for enterprise systems, the choice mostly depends on the ecosystem like AWS or Azure. for high-concurrency apps, I’d choose Go, Node.js, i prefer go because goroutines are fantastic.
English
0
0
1
2K
Aman 🧋
Aman 🧋@CodeWithAmann·
Which backend stack has the strongest future?
Aman 🧋 tweet media
English
320
44
1.6K
244.8K
Anna retweetledi
Ashutosh Maheshwari
Ashutosh Maheshwari@asmah2107·
Database stuff I’d study if I wanted to understand scaling deeply: Bookmark this. B+ Trees LSM Trees Write-Ahead Logging Two-Phase Commit Three-Phase Commit Read Replicas Leader-Follower Replication Partitioning Query Caching Secondary Indexes Vector Indexes (FAISS, HNSW) Distributed Joins Materialized Views Event Sourcing Change Data Capture Follow @asmah2107 to learn more on scalable system design.
Ashutosh Maheshwari tweet media
English
7
109
751
36K
Anna retweetledi
astaxie
astaxie@astaxie·
今天群里面讨论怎么样学习 Harness,Harness 工程我学习这两个: 1. github.com/walkinglabs/le… 通过这个了解每一个 Harness 的核心机制 2. github.com/badlogic/pi-mo… 学习这个框架的各个模块设计实现,不懂的就让 AI 去解读实现逻辑
中文
12
347
2K
138.2K
Anna retweetledi
Shruti Codes
Shruti Codes@Shruti_0810·
Most scrapers die in seconds. Blocked. Flagged. Useless. This one doesn’t. It adapts. Rotates. Fetches. Modern anti-bot systems weren’t ready for this. Fewer blocks. More data. Real advantage. github.com/D4Vinci/Scrapl…
Shruti Codes tweet media
English
1
2
14
1.7K
Anna retweetledi
Abraham John 🦄🦓
Abraham John 🦄🦓@Abmankendrick·
UI/UX Designers, here are my go-to best design resource sites on the internet you should bookmark: Design Library → curations.supply Landing Pages → landing.love Saas Websites → saaspo.com AI Mobile App Builder → sleek.design/?ref=abrahambw Fonts → uncut.wtf Animation → 60fps.design Mobile Apps → mobbin.com/?via=abraham Brands → rebrand.gallery Icons → hugeicons.com/?via=Abraham Design Systems → component.gallery
Abraham John 🦄🦓 tweet media
English
44
483
3.7K
746.7K
Anna retweetledi
Cameron R. Wolfe, Ph.D.
Cameron R. Wolfe, Ph.D.@cwolferesearch·
Strongly recommend the LLM-as-a-Verifier writeup. Biggest takeaway for me is that increasing scoring granularity makes the verifier more effective. This indicates that LLM judges / verifiers are developing new (and better) capabilities. This did not work well 1-2 years ago. In fact, LLM-as-a-Judge best practice was that lower scoring granularity (e.g., binary, ternary, or 1-5 Likert score) worked way better than granular scores (e.g., 1-100 scale). This was a constant recommendation I gave for setting up LLM judges properly. It seems like recent frontier LLMs now are better at scoring at finer granularities, making this best practice (potentially) obsolete. One caveat to this finding is that the scoring setup used in this writeup is a specific setup based upon logprobs. Instead of just using the score token outputted by the LLM as the result, they compute the logprob of each possible score token and take a weighted average of scores (with weights given by probabilities). Then, they go further by expanding this weighted average across repeated verifications and multiple criterion: Reward = (1 / CK) * ∑_{c=1}^{C} ∑_{k=1}^{K} ∑_{g=1}^{G} score_logprob * score_value where C is the total number of evaluation criterion, K is the number of repeated verifications, and G is the scoring granularity (i.e., number of unique scoring output options). The reward determines if a particular output passes verification across criteria. When using this logprob setup, we see consistent gains in verifier accuracy by: - Increasing scoring granularity G. - Increasing repeated verifications K. - Increasing the number of evaluation criterion C. The last two findings are in line with prior work, but the fact that higher scoring granularity is helpful is interesting! In the LLM-as-a-Verifier paper, this system is used at inference time in a pairwise fashion as described below. "To pick the best trajectory among N candidates for a given task, a round-robin tournament is conducted. For every pair (i, j) the verifier produces Reward(i) and Reward(j) using the formula above. The trajectory with the higher reward receives a win, and the trajectory with the most wins across all \binom{N}{2} pairs is selected."
Cameron R. Wolfe, Ph.D. tweet media
English
15
103
971
191.1K
Anna retweetledi
Olivia Chowdhury
Olivia Chowdhury@Oliviacoder1·
I just put Perplexity Computer through its paces by having it run a complete SEO audit on my site—and it honestly did the kind of work I’d usually expect from a $2,000+ agency report. No tool-hopping, no spreadsheet chaos. I fed it a single, well-structured prompt, and within seconds it came back with a full strategic teardown. Prompt: “Perform an end-to-end SEO audit of my website. Review technical SEO, on-page content, internal linking, and performance signals. Then categorize and rank issues by impact and required effort, and deliver a prioritized implementation roadmap.” 📊 What it delivered: • Technical SEO problems (crawlability/indexation, broken links) • On-page optimization misses (titles, meta, headings/content structure) • Page-by-page keyword alignment gaps • A concrete internal linking upgrade plan • A prioritized fix list (high / medium / low impact) • Clear next steps for both developers and the content team This wasn’t a pile of metrics—it read like an SEO strategy doc you could start executing immediately.
English
46
49
127
32.2K
Anna retweetledi
Shopify Engineering
Shopify Engineering@ShopifyEng·
Since we open-sourced pi-autoresearch, @Shopify teams have been running it on everything. Results so far: Unit tests: 300x faster React component mounting: 20% faster CI build time: 65% reduction Made pnpm run faster Autoresearch never stops trying things you'd never have time to try. Repo: github.com/davebcn87/pi-a…
English
29
200
2.4K
324.6K
Anna retweetledi
Dmytro Chuta
Dmytro Chuta@dmitriychuta·
💚 Today DeskMinder is free to download on the App Store. Try it before getting Lifetime 🚀
English
45
80
1.8K
250.3K
Anna retweetledi
China pulse 🇨🇳
China pulse 🇨🇳@Eng_china5·
Children are seen bothering a robot, and it fails to escape from them.
English
14
24
173
41.5K
Anna retweetledi
trish
trish@TrisH0x2A·
essential topics for backend engineers working with distributed systems - tcp/ip, udp socket programming - rest, grpc for service communication - kafka, rabbitmq for async messaging - concurrency in go/java (goroutines, executorservice) - thread safety and memory models - distributed databases (cassandra, mongodb) - sharding and partitioning strategies - caching patterns (redis, memcached) - consensus algorithms (raft, paxos) - distributed locks and coordination - service discovery and load balancing - circuit breakers and retry logic - distributed tracing (jaeger, zipkin) - monitoring with prometheus and grafana - oauth2, jwt for auth - ssl/tls and secure communication - rate limiting strategies - event-driven architecture (cqrs, event sourcing) - kubernetes for orchestration - cloud-native patterns - api versioning and backward compatibility start with the fundamentals, then build up to distributed patterns. most of these apply across languages and frameworks.
English
5
28
277
8.7K
Anna retweetledi
SumitM
SumitM@SumitM_X·
Java Interviewers love Singletons . Sharing 7 such Singleton interview questions that you should be prepared to answer: 1. What is double-checked locking? 2. Are enums Singleton? 3. Why do we use readResolve() in Singletons? 4. How to overcome issues with reflection and cloning in Singletons? 5. Explain the Bill Pugh Singleton Design and how it works internally. 6. How does Singleton affect garbage collection, and what are the memory management implications? 7. How would you implement a thread-safe Singleton in a multi-module application where the Singleton instance is shared across different modules, and what potential issues might arise?
English
2
20
164
21.4K
Anna retweetledi
SumitM
SumitM@SumitM_X·
Top 7 skills required for Java devs to get a job these days. Which one are you struggling with ? 1. Core Java (8–22) : Streams, records, virtual threads, collections, OOP 2. Spring Boot: REST APIs, validation, profiles, AOP, actuator, config management, devtools, custom starters, error handling. 3. Microservices: Feign/WebClient, API versioning, service discovery, config server, circuit breakers, retries, distributed tracing, API Gateway,SAGA, CQRS. 4. Spring Security : JWT, OAuth2, role-based auth 5. Hibernate/JPA : Mappings, lazy/eager, JPQL, performance tuning 6. DSA : Arrays, trees, graphs, DP, hashing 7. Concurrency : Thread pools, locks, CompletableFuture, Loom
English
8
56
396
18.9K