<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: M P V Aditya</title>
    <description>The latest articles on DEV Community by M P V Aditya (@aditya_fe).</description>
    <link>https://dev.to/aditya_fe</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F572636%2F53e3e6f3-cb8d-4b9e-a89c-c026e708fe55.jpeg</url>
      <title>DEV Community: M P V Aditya</title>
      <link>https://dev.to/aditya_fe</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aditya_fe"/>
    <language>en</language>
    <item>
      <title>Microservices vs AI Agent</title>
      <dc:creator>M P V Aditya</dc:creator>
      <pubDate>Wed, 30 Apr 2025 06:54:34 +0000</pubDate>
      <link>https://dev.to/aditya_fe/microservices-vs-ai-agent-4644</link>
      <guid>https://dev.to/aditya_fe/microservices-vs-ai-agent-4644</guid>
      <description>&lt;p&gt;&lt;strong&gt;Key Differences Between AI Agents and Microservices&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Functionality and Objective&lt;/strong&gt;:- &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microservices&lt;/strong&gt; : These are modular and independent building blocks of an application. They are designed for well-defined backend tasks—such as processing transactions or managing a database—and require explicit instructions. For example, a payment microservice processes payments when requested but doesn’t independently decide when or how to act.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Agents&lt;/strong&gt;: These go beyond performing tasks—they incorporate reasoning, adaptability, and autonomous decision-making to achieve goals. For instance, an AI agent tasked with customer support doesn’t just fetch data from an API; it also understands the context of the conversation, chooses which tools to use, and adapts dynamically based on user input.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Autonomy&lt;/strong&gt; :- &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microservices&lt;/strong&gt; : Are passive and await external commands via APIs. They cannot "decide" on their own or dynamically change their behavior based on context.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Agents&lt;/strong&gt; : Actively make decisions. They orchestrate tools (often via APIs or services) to execute tasks and modify their actions based on feedback or context. This autonomy is key to their purpose.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;User Interaction&lt;/strong&gt; :- &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microservices&lt;/strong&gt; : Typically run in the background and are not user-facing. End-users interact indirectly with them through an application's interface.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Agents&lt;/strong&gt; : Often directly interact with users (like me!). They can understand natural language, ask clarifying questions, and execute tasks autonomously while keeping the user engaged.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Tool Orchestration&lt;/strong&gt; :- &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microservices&lt;/strong&gt;: Operate in isolation and generally perform specific tasks. Coordination (or orchestration) of multiple microservices is managed by external logic, such as a service mesh, orchestrator, or application layer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Agents&lt;/strong&gt; : Choose and orchestrate tools independently. For example, if an agent needs to book a flight, it might use one tool to search flights, another to check prices, and a third to complete the booking—all while adapting to changes or errors.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Technology Focus&lt;/strong&gt; :- &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microservices&lt;/strong&gt; : Built for scalability, performance, and maintainability of software applications. The focus is on dividing monolithic applications into smaller, manageable services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI Agents&lt;/strong&gt; : Centered around intelligence, problem-solving, and natural language understanding. They bring human-like reasoning to tasks, leveraging machine learning models, NLP, and decision frameworks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Analogy to Clarify&lt;/strong&gt;&lt;br&gt;
Think of a microservice as a single tool in a toolbox—each tool has a specific use, and you need to pick it up and use it when required. Meanwhile, an AI agent is like an intelligent handyman who knows how to use those tools, picks the right one for the job, and adapts to unexpected challenges along the way.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>llm</category>
      <category>agents</category>
      <category>aiagents</category>
    </item>
    <item>
      <title>How JavaScript executed in the v8 engine</title>
      <dc:creator>M P V Aditya</dc:creator>
      <pubDate>Thu, 28 Mar 2024 18:42:32 +0000</pubDate>
      <link>https://dev.to/aditya_fe/how-javascript-executed-in-the-v8-engine-53bb</link>
      <guid>https://dev.to/aditya_fe/how-javascript-executed-in-the-v8-engine-53bb</guid>
      <description>&lt;p&gt;Exploring the V8 Engine: The Role of Ignition and TurboFan&lt;/p&gt;

&lt;p&gt;The V8 JavaScript engine is a powerful beast that powers not only Google Chrome but also Node.js, Electron, and a host of other software platforms. It's renowned for its speed and efficiency, which is largely due to its two main components: Ignition and TurboFan. These two systems work in tandem to execute JavaScript code at lightning-fast speeds. But how do they do it? Let's dive in.&lt;/p&gt;

&lt;h3&gt;
  
  
  Parsing and Abstract Syntax Tree (AST) Creation
&lt;/h3&gt;

&lt;p&gt;The journey of JavaScript code execution begins with parsing. V8 takes the raw JavaScript code and breaks it down into a structure it can understand – the Abstract Syntax Tree (AST). This tree represents the syntax of the code in a hierarchical form, with each node representing a construct occurring in the source code.&lt;/p&gt;

&lt;h3&gt;
  
  
  Bytecode Generation by Ignition
&lt;/h3&gt;

&lt;p&gt;Once the AST is in place, Ignition comes into play. This low-level, register-based interpreter takes the AST and converts it into bytecode. This bytecode is a lower-level, platform-independent representation of the original JavaScript code. It's designed to be compact and efficient, allowing for quick interpretation and execution.&lt;/p&gt;

&lt;h3&gt;
  
  
  Execution: The Role of Ignition
&lt;/h3&gt;

&lt;p&gt;Ignition then walks through this bytecode, executing it line by line. It's a meticulous process, where Ignition manages the call stack and handles memory allocation among other operations. This step is crucial as it's where the code actually comes to life and performs the operations it was written to do.&lt;/p&gt;

&lt;h3&gt;
  
  
  Optimization with TurboFan
&lt;/h3&gt;

&lt;p&gt;However, not all code is created equal. Some parts are executed more frequently than others. These "hot" parts are where TurboFan, V8's optimizing compiler, comes in. TurboFan compiles these frequently executed parts into highly optimized machine code, tailored to the specific hardware it's running on. This results in a significant performance boost.&lt;/p&gt;

&lt;h3&gt;
  
  
  Adaptive Execution: Switching Between Ignition and TurboFan
&lt;/h3&gt;

&lt;p&gt;One of the most interesting aspects of V8 is its ability to switch between Ignition and TurboFan. This adaptive execution ensures that JavaScript code runs as efficiently as possible. When a piece of code is identified as "hot," TurboFan takes over, optimizing it on the fly. If the code changes or is no longer frequently executed, V8 can switch back to Ignition, ensuring resources are used effectively.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;The interplay between Ignition and TurboFan is a fine example of modern computing – a symphony of interpretation and compilation, working together to make JavaScript a fast and efficient language for the web and beyond. As developers, understanding these underlying processes can help us write better, more performance-oriented code. And as users, we can appreciate the complex machinery that works silently behind the scenes every time we open a web page or run a Node.js application. V8 is truly a marvel of software engineering, and its continuous evolution promises even faster and more efficient JavaScript execution in the years to come.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>VPN - how it works</title>
      <dc:creator>M P V Aditya</dc:creator>
      <pubDate>Mon, 27 Mar 2023 08:46:28 +0000</pubDate>
      <link>https://dev.to/aditya_fe/vpn-how-it-works-fhc</link>
      <guid>https://dev.to/aditya_fe/vpn-how-it-works-fhc</guid>
      <description>&lt;p&gt;Understanding the Risks of Public Networks and Protecting Your Data&lt;/p&gt;

&lt;p&gt;In today's digital age, the convenience of public Wi-Fi networks has become a staple for on-the-go internet users. However, this convenience often comes with a price: security risks. When you connect to a public network and engage in activities such as paying bills, you may inadvertently expose sensitive information to potential cyber threats.&lt;/p&gt;

&lt;p&gt;One of the common ways your data can be compromised is through a technique known as "Man-in-the-Middle" (MitM) attacks. In this scenario, an attacker intercepts the communication between your device and the server you're trying to connect to. This can happen in any unsecured network, but public Wi-Fi networks are particularly vulnerable because they are often not encrypted.&lt;/p&gt;

&lt;p&gt;During a MitM attack, the attacker can gain access to the data being transmitted, which may include personal details, passwords, and financial information. The request headers sent from your browser or mobile app, such as the IP address (X-FORWARDED-FOR) and browser type, can also be captured by the attacker.&lt;/p&gt;

&lt;p&gt;To protect yourself from such vulnerabilities, it's crucial to take proactive measures:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use a Virtual Private Network (VPN):&lt;/strong&gt; A VPN creates a secure tunnel for your data to travel through, encrypting it and making it difficult for attackers to intercept.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Ensure Websites are HTTPS Secured:&lt;/strong&gt; Before entering any sensitive information, verify that the website uses HTTPS, indicating that the data you send and receive is encrypted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Your Software Updated:&lt;/strong&gt; Regularly update your browser and any apps you use to patch any security vulnerabilities that could be exploited.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Avoid Public Wi-Fi for Sensitive Transactions:&lt;/strong&gt; If possible, use a trusted network when performing transactions that involve sensitive information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use Multi-Factor Authentication (MFA):&lt;/strong&gt; MFA adds an extra layer of security by requiring a second form of verification, such as a text message or an authentication app.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By understanding the risks associated with public networks and implementing these security practices, you can significantly reduce the chances of falling victim to cyber threats like MitM attacks. Always be vigilant and prioritize your digital safety to ensure that your personal and financial information remains secure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who invented the VPN ?&lt;/strong&gt;&lt;br&gt;
Microsoft launched VPN for its employees to work from home. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What VPN do?&lt;/strong&gt;&lt;br&gt;
Virtual Private Network(VPN), it will create a secured tunnel and all your information which you pass from a request is encrypted.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F93miy2ornp5hh41xjeao.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F93miy2ornp5hh41xjeao.jpg" alt="Image description" width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How My IP is not revealed ?&lt;/strong&gt;&lt;br&gt;
Understanding VPNs: How They Protect Your Internet Activity&lt;/p&gt;

&lt;p&gt;In the digital age, privacy and security are paramount, and Virtual Private Networks (VPNs) play a crucial role in safeguarding your online activities. A VPN is a service that creates a secure, encrypted tunnel between your device and the internet, protecting your data from prying eyes. Here's how it works:&lt;/p&gt;

&lt;p&gt;When you send a request over the internet, such as visiting a website, your VPN client encrypts this request. This encrypted data is then sent through a secure tunnel to the VPN server. The VPN server, acting as a middleman, decrypts your request and sends it to the internet on your behalf. The response from the internet is then encrypted by the VPN server and sent back to you through the secure tunnel. Once the data arrives back on your device, the VPN client decrypts the information, allowing you to view it in your browser.&lt;/p&gt;

&lt;p&gt;The beauty of this process is that your IP address, which can reveal your location and identity, is hidden. Instead, the VPN server's IP address is what appears to the outside world. This means that your online footprint is masked, and your privacy is maintained.&lt;/p&gt;

&lt;p&gt;VPNs are especially useful when you're using public Wi-Fi networks, which are often unsecured and leave you vulnerable to attacks. By encrypting your data, a VPN ensures that even if someone were to intercept your data, they would not be able to understand it.&lt;/p&gt;

&lt;p&gt;Moreover, VPNs can help bypass geographical restrictions. Since you can appear to be browsing from the VPN server's location, you can access content that may be restricted in your actual location.&lt;/p&gt;

&lt;p&gt;In conclusion, VPNs are a powerful tool for maintaining online privacy and security. They protect your data, hide your identity, and can even open up a new world of content for you to explore. As we continue to spend more of our lives online, the importance of tools like VPNs will only grow. It's essential to understand how they work and to consider using one to protect your digital life.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
