Technical Architecture

6-Layer Enterprise Architecture

Built for scale, security, and learning science. Every layer is production-ready with strict data isolation, SOC 2 compliance, and enterprise-grade reliability.

6
Architecture Layers
4
AI Agents
50+
Integrations
99.9%
Uptime SLA
Architecture Diagram

Layer Explorer

Click any layer to expand its services, technologies, and implementation details.

L1Frontend Layer

Next.js 14 + Tailwind CSS + Clerk Auth

L2API Gateway

FastAPI + Multi-Tenant Routing + Rate Limiting

L3Core Services

Content, Enrollment, Analytics, Skills Intelligence

L4AI Agentic Layer

LangGraph + GPT-4o + RAG Pipeline

4
Agents
6 types
LLM Calls
1536
Vector Dims
RAG IngestorLangChain, OpenAI

Extract → Chunk → Embed → Store pipeline

AI TutorGPT-4o, SSE streaming

State-aware RAG chat with mastery adaptation

Course OrchestratorMulti-step LLM chain

Outline → Retrieve → Generate → Transactional commit

Assessment AgentStructured output

MCQ generation with rubric-based grading

L5Learning Science Engine

SM-2 Algorithm + Retrieval Practice + Mastery Gates

L6Data & AI Infrastructure

PostgreSQL + pgvector + S3 + Redis

Technology Stack

Backend
Python 3.11
FastAPI
SQLAlchemy 2.0
Alembic
Celery
Pydantic v2
AI / ML
GPT-4o
LangChain
OpenAI Embeddings
pgvector (HNSW)
SuperMemo-2
ElevenLabs TTS
Frontend
Next.js 14
React 19
Tailwind CSS
Recharts
Clerk Auth
TypeScript
Infrastructure
PostgreSQL 16
Redis 7
MinIO / S3
Docker Compose
GitHub Actions
Nginx

Enterprise Security

SOC 2 compliant out of the box. Every layer enforces strict data isolation and security.

Data Isolation

Complete per-organization data separation. Every query is scoped to ensure no cross-tenant data leakage.

Secret Management

All credentials managed through secure vaults. Zero hardcoded keys in the entire codebase.

SOC 2 Audit Trail

Every data modification is logged with full context — who, when, and what changed — for complete auditability.

Intelligent Rate Limiting

Per-organization rate controls protect against abuse while ensuring fair usage across all customers.

Network Security

Strict origin controls, encrypted connections, and no wildcard access in production environments.

Continuous Scanning

Automated vulnerability scanning in CI/CD. Security headers enforced: HSTS, CSP, X-Frame-Options.