Artificial Intelligence
2-
Data Provenance in Machine Learning: Traceability, Graph Methods, and Governance Lessons
Graph neural networks, PROV-ML, and data lineage in machine learning. Evidence-graded review with ten practical governance lessons for ML practitioners.
-
Large Language Models in Practice: From the Transformer to the Present Frontier
LLMs explained: from the 2017 Transformer through GPT-3, alignment, and knowledge distillation. Ten engineering lessons for governance and trustworthy AI deployment.
Cybersecurity
2-
Deadlock and Resource Contention: Operating Systems Theory Applied to Supply Chains, Cloud Platforms, and LLM Systems
Coffman conditions and deadlock theory applied to supply chain attacks, cloud fragmentation, and LLM scheduling. Ten prevention and recovery lessons.
-
axios npm Supply Chain Compromise 2026: Ten Evidence-Based Lessons on Trust, Provenance, and Resilient Engineering
How malicious axios npm versions propagated via a compromised credential in 2026. Timeline, attribution, IOCs, and ten engineering lessons for supply chain defense.
Digital Governance
1-
Digital Sovereignty in Practice: Ten Engineering Lessons from China's Cloud Access Fragmentation, 2014 to 2026
Cloud localization in China: how SaaS platforms bifurcate, AI services get blocked, and compliance forces platform fragmentation. Ten engineering lessons.
Operating Systems
1-
Deadlock and Resource Contention: Operating Systems Theory Applied to Supply Chains, Cloud Platforms, and LLM Systems
Coffman conditions and deadlock theory applied to supply chain attacks, cloud fragmentation, and LLM scheduling. Ten prevention and recovery lessons.
Platform Engineering
1-
Deadlock and Resource Contention: Operating Systems Theory Applied to Supply Chains, Cloud Platforms, and LLM Systems
Coffman conditions and deadlock theory applied to supply chain attacks, cloud fragmentation, and LLM scheduling. Ten prevention and recovery lessons.
System Design
1-
Deadlock and Resource Contention: Operating Systems Theory Applied to Supply Chains, Cloud Platforms, and LLM Systems
Coffman conditions and deadlock theory applied to supply chain attacks, cloud fragmentation, and LLM scheduling. Ten prevention and recovery lessons.