Docker Blog: Build Permission-Aware RAG with the SpiceDB Testcontainer
This blog post shows how you can pair SpiceDB with Testcontainers to give you the ability to test your permission logic inside your RAG pipeline, end-to-end, automatically, with zero infrastructure dependencies
Read The Article →Pinecone: Securing Knowledge Retrieval using SpiceDB and ReBAC
How to model permissions, and how to apply access control both before and after retrieval in a RAG pipeline built with Pinecone, SpiceDB and OpenAI embeddings.
Learn More →Policy Engines Dont Work for AI Authorization
Cedar and other policy engines dont work for AI Agent Authorization
Read Article →Dont use JWT for Authorization!
Hopefully this post will walk you through why JSON Web Tokens (JWT) might not be your best friend, and the rare cases where they actually make sense.
Read Article →A Timeline of Model Context Protocol (MCP) Security Breaches
AI fundamentally changes the interface, but not the fundamentals of security.
Learn More →Safeguarding Your Data When Using DeepSeek R1 In RAG Pipelines
Secure your RAG pipelines with Fine Grained Authorization while also about making your queries secure and efficient!
Read Article →Deploy SpiceDB to Amazon ECS
Amazon ECS is a fully managed container orchestration service. This post shows how to deploy SpiceDB to Amazon ECS (and why you probably shouldnt in prod!)
Read Article →Beware of the New Enemy Problem ⚠️
the New Enemy Problem is a scenario where unauthorized access can occur when changes to permissions and the resources they protect are not updated together consistently. This is a post that describes New Enemy, and how to design for it
Read Article →SpinKube & Flux on Kubernetes v1.30
Guide to automated deployments using SpinKube with Flux for modern Kubernetes environments, covering setup, configuration, and best practices.
Read Article →Open Source and The Cloud (Dutch)
Exploring the future of IT through the combination of open source technologies and cloud computing, discussing trends and opportunities.
Read Article →Busting Common Myths about Lock-In (Dutch)
Addressing common misconceptions about cloud provider lock-in and explaining how to maintain freedom of choice in cloud computing.
Read Article →The Cloud Offers Freedom of Choice (Dutch)
Discussing how cloud computing provides businesses with flexibility and choice in their technology decisions and architectural approaches.
Read Article →The Science Behind Voice Interfaces
Deep dive into the technology that powers voice user interfaces, covering speech recognition, natural language processing, and machine learning.
Read Article →Voice Interfaces Will Lower Barriers to Technology
Exploring how voice interfaces make technology more accessible and reduce the learning curve for users across different demographics.
Read Article →How Voice Interfaces Will Improve Your Life
Predictions and analysis of how voice technology will transform daily life, from smart homes to business applications.
Read Article →What Does It Mean for Your Brand in a Voice-Centric World
Strategic insights for businesses on adapting to voice technology and creating voice-first brand experiences.
Read Article →