Tagged articles
22 articles
Page 1 of 1
AI Engineer Programming
AI Engineer Programming
Apr 29, 2026 · Information Security

Managing AI Agents Like Engineering Teams: A Five‑Layer Governance Stack

The article presents a five‑layer governance stack for AI agents—identity, centralized tool registry, policy enforcement, behavioral anomaly detection, and unified security posture—detailing how each layer mirrors traditional engineering team management to reduce attack surface, audit complexity, and migration costs.

AI agentsanomaly detectioncloud security
0 likes · 11 min read
Managing AI Agents Like Engineering Teams: A Five‑Layer Governance Stack
Machine Learning Algorithms & Natural Language Processing
Machine Learning Algorithms & Natural Language Processing
Mar 3, 2026 · Artificial Intelligence

Identity Constraint Beats DeepSeek mHC After 150B Tokens: A Surprising Reversal

Extensive experiments on DeepSeek's 1.7B and 8B models reveal that replacing the manifold hyper‑connection (mHC) constraint with a simple identity matrix consistently outperforms the original mHC, improves signal flow stability, and avoids the collapse caused by repeated Sinkhorn‑Knopp projections.

DeepSeekHyper-ConnectionSinkhorn
0 likes · 12 min read
Identity Constraint Beats DeepSeek mHC After 150B Tokens: A Surprising Reversal
Code Mala Tang
Code Mala Tang
Jan 19, 2025 · Fundamentals

Master the 6 Most Common Python Pitfalls and How to Avoid Them

This article explores six frequently misunderstood Python features—mutable default arguments, the difference between is and ==, *args/**kwargs, iterator exhaustion, complex list comprehensions, and the global keyword—explaining why they trip developers up and offering clear, practical solutions to master each one.

PitfallsPythonargs-kwargs
0 likes · 8 min read
Master the 6 Most Common Python Pitfalls and How to Avoid Them
High Availability Architecture
High Availability Architecture
Apr 15, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article reviews the historical evolution of login authentication—from simple username/password in monolithic apps to token mechanisms, unified account centers, OAuth, and sub‑tokens—while also presenting modern one‑click, trusted‑device, and facial‑verification login methods and future AI‑driven security trends.

OAuthUser experienceidentity
0 likes · 13 min read
Evolution and Design of Login Authentication Systems
Laravel Tech Community
Laravel Tech Community
Apr 17, 2022 · Blockchain

Understanding Web3: Decentralization, Native Payments, and Tokenized Governance

The article explains the fundamental differences between Web2 and Web3, emphasizing decentralization, verifiable trustless networks, native token payments, new company formation models, and identity management through wallet addresses, illustrating how blockchain-based protocols enable decentralized applications and token economies.

BlockchainDAppsDecentralization
0 likes · 6 min read
Understanding Web3: Decentralization, Native Payments, and Tokenized Governance
Java Architect Essentials
Java Architect Essentials
Sep 13, 2021 · Information Security

Token-Based Authentication System: Scenarios, Types, and Hierarchical Design

This article analyzes various client scenarios in multi‑client information systems, categorizes authentication tokens (password, session, API, access, PAM, MAP), compares their natural and controllable attributes, proposes a hierarchical token architecture, and discusses security, privacy, and practical application considerations.

Authenticationaccess controlidentity
0 likes · 13 min read
Token-Based Authentication System: Scenarios, Types, and Hierarchical Design
Java Interview Crash Guide
Java Interview Crash Guide
Jul 13, 2021 · Information Security

Mastering Token-Based Authentication: Types, Scenarios, and Best Practices

This article analyzes various token‑based authentication methods across multiple client scenarios, categorizes tokens into password, session, and API types, compares their natural and controllable attributes, outlines hierarchical relationships, and offers design guidelines to improve security, privacy, and usability in multi‑client systems.

APITokenaccess control
0 likes · 14 min read
Mastering Token-Based Authentication: Types, Scenarios, and Best Practices
IT Architects Alliance
IT Architects Alliance
Jun 21, 2021 · Information Security

Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations

This article analyses various client‑side authentication scenarios, classifies token types such as password, session, and API tokens, compares their cost, risk, and controllable attributes, and proposes a layered token architecture to improve security, privacy, and usability across multiple platforms.

AuthenticationSecuritySession
0 likes · 13 min read
Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations
IT Architects Alliance
IT Architects Alliance
May 5, 2021 · Information Security

Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design

This article analyzes various client scenarios in multi‑client systems, classifies authentication tokens into password, session, and interface categories, compares their natural and controllable attributes, and proposes a layered token hierarchy to improve security, privacy, and usability across web, mobile, and API platforms.

AuthenticationSecurityToken
0 likes · 9 min read
Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design
Top Architect
Top Architect
Apr 13, 2021 · Information Security

Design and Analysis of a Token‑Based Identity Authentication System

This article analyzes token‑based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, and proposes a hierarchical token architecture that balances security, usability, and lifecycle management across web, mobile, and API scenarios.

APISessionaccess control
0 likes · 10 min read
Design and Analysis of a Token‑Based Identity Authentication System
Architecture Digest
Architecture Digest
Dec 25, 2020 · Information Security

Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design

This article analyzes token-based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, proposes a four‑layer hierarchy, and discusses practical usage scenarios and design principles to improve security and privacy.

AuthenticationSecuritySession
0 likes · 9 min read
Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design
Programmer DD
Programmer DD
Dec 12, 2020 · Information Security

Designing a Secure Multi‑Client Token Authentication System

This article analyzes various client scenarios in modern information systems, categorizes authentication tokens, compares their natural and controllable attributes, proposes a hierarchical token model, and outlines best‑practice principles to achieve secure, privacy‑preserving identity verification across web, mobile, and API platforms.

Tokenaccess controlidentity
0 likes · 11 min read
Designing a Secure Multi‑Client Token Authentication System
Python Programming Learning Circle
Python Programming Learning Circle
Jun 2, 2020 · Fundamentals

Understanding the Difference Between == and is in Python 3.6

This article examines the implementation details of Python's == and is operators, showing how both are compiled to COMPARE_OP bytecode with different opcodes, exploring the underlying C functions like cmp_outcome and object_richcompare, and explaining the rich comparison protocol and its default behavior.

ComparisonPythonbytecode
0 likes · 11 min read
Understanding the Difference Between == and is in Python 3.6
Architecture Digest
Architecture Digest
Apr 4, 2020 · Information Security

Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems

This article analyses various authentication scenarios in multi‑client information systems, classifies token types such as password, session, access, and QR‑code tokens, compares their natural and controllable attributes, and proposes a four‑layer hierarchical architecture to improve security and manageability.

access controlidentitymulti-client
0 likes · 10 min read
Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems
Top Architect
Top Architect
Mar 2, 2020 · Information Security

Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure

This article analyses various client scenarios in multi‑client systems, classifies authentication tokens into password, session, API, and other categories, compares them across usage cost, change cost, and security risks, and presents a hierarchical token model with detailed usage steps and practical considerations.

SessionTokenaccess_token
0 likes · 12 min read
Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure
Java Captain
Java Captain
Apr 22, 2019 · Information Security

Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design

This article analyses various client‑side authentication scenarios, classifies tokens into password, session, and API categories, compares their natural and controllable attributes, and proposes a four‑layer hierarchical token architecture to improve security, usability, and decoupling across multiple platforms.

AuthenticationSecurityToken
0 likes · 13 min read
Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design