Best Practices & Examples

General usage, rate limits, authenticating, and examples