Tagged articles
17 articles
Page 1 of 1
PMTalk Product Manager Community
PMTalk Product Manager Community
May 2, 2026 · Artificial Intelligence

Why Codex Beats Claude Code: Not the Model, but the Trust to Hand Over Work

The article analyzes how Codex App surpasses Claude Code by offering a sandboxed environment, permission controls, task‑list UI, planning and steering modes, Git rollback, worktree isolation, cloud integration, plugins, skills and MCP, turning the AI coding assistant into a controllable engineering workbench for a broader range of users.

AI coding assistantWorktreecloud integration
0 likes · 12 min read
Why Codex Beats Claude Code: Not the Model, but the Trust to Hand Over Work
AI Architecture Hub
AI Architecture Hub
Apr 22, 2026 · Artificial Intelligence

Build a Minimal AI Agent Loop in 30 Minutes and Turn It into a Stable Production System

This article walks through constructing a tiny, runnable AI agent loop that reads a user task, lets the model choose the next step, calls a tool, feeds the observation back, and repeats, then explains how to add harness, memory, permission, and validation layers to make the agent reliable in real‑world engineering environments.

AI AgentAgent LoopHarness
0 likes · 30 min read
Build a Minimal AI Agent Loop in 30 Minutes and Turn It into a Stable Production System
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Apr 3, 2026 · Artificial Intelligence

Why Post‑Filtering Fails in Enterprise RAG and How to Securely Pre‑Filter

Enterprise RAG systems often mistakenly apply post‑filtering, retrieving unauthorized documents before permission checks, which violates audit compliance, wastes Top‑K slots, and risks data leakage in multi‑tenant environments; this article explains why pre‑filtering at the vector search layer, proper metadata design, token validation, and dynamic permission handling are essential.

Pre-filteringRAGSecurity
0 likes · 15 min read
Why Post‑Filtering Fails in Enterprise RAG and How to Securely Pre‑Filter
Sohu Tech Products
Sohu Tech Products
Feb 4, 2026 · Frontend Development

How to Seamlessly Integrate Legacy Backends with Vue and Qiankun Micro‑Frontend

This article presents a comprehensive case study on unifying multiple legacy backend systems by building a modern Vue‑based front‑end, combining native iframe integration with the qiankun micro‑frontend framework to achieve a single entry point, smooth migration, reduced costs, and an evolvable architecture for enterprise applications.

Frontend ArchitectureIframe IntegrationPerformance Monitoring
0 likes · 18 min read
How to Seamlessly Integrate Legacy Backends with Vue and Qiankun Micro‑Frontend
Java Tech Enthusiast
Java Tech Enthusiast
May 19, 2025 · Information Security

Why Validation Matters: Java Bean Validation and Permission Checks

This article explains why both front‑end and back‑end data validation are essential for secure and user‑friendly web applications, introduces Java Bean Validation annotations, shows how to integrate them with Spring MVC, and compares common Java permission‑control frameworks such as Spring Security, Shiro and Sa‑Token.

Bean ValidationJavadata validation
0 likes · 16 min read
Why Validation Matters: Java Bean Validation and Permission Checks
Java Tech Enthusiast
Java Tech Enthusiast
Feb 23, 2025 · Information Security

Why Windows 11’s UI and Security Flaws Frustrate Users and Developers

The article critiques Windows 11’s cumbersome secondary right‑click menu, weak permission controls that render UAC ineffective, rampant adware, and the platform’s poor developer experience, arguing that these design missteps undermine both user satisfaction and system security.

Developer ExperienceOperating SystemSecurity
0 likes · 7 min read
Why Windows 11’s UI and Security Flaws Frustrate Users and Developers
Architect
Architect
Jan 13, 2025 · Backend Development

Designing a Flexible Permission Control System with Java Annotations and Spring AOP

This article explains how to build a flexible, scalable permission control system in Java using custom annotations and Spring AOP, covering basic concepts, system requirements analysis, database schema design, annotation definitions, aspect implementation, and business logic services for comprehensive access management.

Backend DevelopmentJavapermission control
0 likes · 19 min read
Designing a Flexible Permission Control System with Java Annotations and Spring AOP
DataFunTalk
DataFunTalk
Jan 6, 2025 · Artificial Intelligence

Building and Applying NIO's Enterprise Knowledge Platform: Architecture, Challenges, and Future Directions

This article presents a comprehensive overview of NIO's company‑wide knowledge platform, detailing its background, layered architecture, retrieval‑augmented generation workflow, challenges such as accuracy, permission control and high concurrency, and future plans for AI‑assisted understanding, creation, multimodal capabilities, and expanded knowledge types.

AIRAGenterprise architecture
0 likes · 18 min read
Building and Applying NIO's Enterprise Knowledge Platform: Architecture, Challenges, and Future Directions

How Hudi MetaServer Transforms Metadata Management and Performance in Data Lakes

This article examines the challenges of Hudi metadata stored on HDFS, introduces the independently developed Hudi MetaServer for centralized metadata, visual management, unified permission control, TTL, expression payloads, and multi‑active scaling, and outlines future enhancements such as LLS, multi‑table fusion, and JDBC support.

Big DataData LakeHudi
0 likes · 11 min read
How Hudi MetaServer Transforms Metadata Management and Performance in Data Lakes
Youku Technology
Youku Technology
Oct 26, 2021 · Frontend Development

ABF Platform Configuration Center: Building a Configuration-Driven Middle-Office Development System

The ABF Platform Configuration Center serves as a factory‑style, configuration‑driven middle‑office development system that unifies application, page, permission, layout, and custom extensions, allowing nearly 100 % reuse of rendering functions and rapid, standardized creation of internal business applications.

ABF platformConfiguration CenterFrontend Architecture
0 likes · 9 min read
ABF Platform Configuration Center: Building a Configuration-Driven Middle-Office Development System
Top Architect
Top Architect
Aug 20, 2020 · Information Security

Understanding Permission Control in Frontend‑Backend Separation Architecture

The article explains how permission control in a front‑back separation architecture defines resources and permissions, outlines the distinct responsibilities of frontend and backend in enforcing access, and provides practical implementation examples with component tags and Java interceptor code.

Backend SecurityComponent DesignJava interceptor
0 likes · 6 min read
Understanding Permission Control in Frontend‑Backend Separation Architecture
Architecture Digest
Architecture Digest
Mar 19, 2020 · Frontend Development

Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture

This article explains how permission control is re‑designed for front‑end/back‑end separated applications, defining resources and permissions, outlining the distinct responsibilities of front‑end routing and component rendering versus back‑end API validation, and providing practical implementation examples in React and Java.

Backend DevelopmentComponent DesignJava
0 likes · 7 min read
Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture
Efficient Ops
Efficient Ops
Feb 25, 2020 · Information Security

What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster

The 2020 Weimeng incident, caused by a malicious VPN‑based intrusion that deleted production databases, exposed massive financial loss, damaged corporate reputation, and highlighted critical gaps in permission control, backup strategies, legal compliance, and security awareness for modern operations teams.

Legal Compliancebackup strategypermission control
0 likes · 14 min read
What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster
Java Captain
Java Captain
Aug 17, 2019 · Frontend Development

Designing Permission Control in a Front‑End/Back‑End Separated Architecture

This article explains how permission control is re‑thought for front‑end/back‑end separated systems, defining resources and permissions, outlining the distinct responsibilities of the front‑end and back‑end, and providing concrete implementation examples with component‑level checks and server‑side interceptors.

BackendComponentJava
0 likes · 6 min read
Designing Permission Control in a Front‑End/Back‑End Separated Architecture
Efficient Ops
Efficient Ops
Nov 17, 2016 · Operations

How Qunar Built an Automated Network Device Operations Platform to Boost Efficiency

This article explains how Qunar tackled growing network device management workload, low‑efficiency manual processes, and operational risk by designing an integrated platform that automates common tasks, enforces permission‑based controls, records audits, and provides real‑time monitoring and scalable data collection.

Automationmonitoringpermission control
0 likes · 8 min read
How Qunar Built an Automated Network Device Operations Platform to Boost Efficiency
Qunar Tech Salon
Qunar Tech Salon
Oct 11, 2016 · Operations

Design and Implementation of Qunar Network Device Operations Platform

Facing growing network device counts and limited netops staff, Qunar built a network device operations platform that integrates command automation, permission-controlled tasks, monitoring, and dynamic scaling using Docker, Marathon, and Celery, thereby improving efficiency, reducing risk, and enabling comprehensive auditability.

Infrastructurenetwork operationspermission control
0 likes · 8 min read
Design and Implementation of Qunar Network Device Operations Platform