Best of ByteByteGoJuly 2025

  1. 1
    Article
    Avatar of bytebytegoByteByteGo·40w

    EP171: The Generative AI Tech Stack

    Comprehensive overview of the generative AI technology stack, covering nine key components from cloud infrastructure and foundational models to safety and monitoring tools. Also includes curated resources for learning software architecture, database indexing fundamentals, AI agent development roadmap, and an introduction to Model Context Protocol servers for connecting AI models to external tools and services.

  2. 2
    Article
    Avatar of bytebytegoByteByteGo·40w

    How Tinder’s API Gateway Handles A Billion Swipes Per Day

    Tinder built TAG (Tinder API Gateway), a custom JVM-based framework on Spring Cloud Gateway, to handle over a billion swipes daily. The solution replaced fragmented third-party gateways with a unified framework that allows each team to deploy independent gateway instances. TAG features configuration-driven routing, global filters for geolocation and session management, custom middleware support, and integration with Envoy service mesh. The system processes requests through a defined pipeline including reverse geo IP lookup, request scanning, session validation, and configurable pre/post filters, enabling faster development cycles while maintaining security and performance at scale.

  3. 3
    Article
    Avatar of bytebytegoByteByteGo·38w

    How Cursor Serves Billions of AI Code Completions Every Day

    Cursor is an AI-powered code editor built on VS Code that serves billions of AI completions daily. It features real-time code autocomplete, AI chat assistance, inline editing, and background agents that work in the cloud. The system handles over 1 million queries per second using a distributed infrastructure across AWS, Azure, and GCP, with privacy-focused codebase indexing through vector embeddings. Cursor integrates multiple AI models including GPT-4, Claude, and custom fine-tuned models to provide intelligent coding assistance while maintaining security through encryption and ephemeral data handling.