The Muggles Guide to Cloud Security Risks and Best Practices The muggles guide to cloud security risks and best practices, a short compendium.
LangChain Decoded: The Muggles Guide to LangChain The muggles guide to LangChain, a short compendium. A series of posts on the fast-growing LangChain LLM development framework.
Getting Started with Google Titan Security Key: A Beginner's Guide A brief introduction to the Google Titan security key, common authentication use cases, and examples for using the key in app authentication.
Getting Started with YubiKey Security Key: A Beginner's Guide A brief introduction to the YubiKey security key, common authentication use cases, and examples for using the key in app authentication.
The Muggles Guide to Software Supply Chain Security The muggles guide to software supply chain security, a short compendium.
The Muggles Guide to Multisig Wallets The muggles guide to multi-signature wallets, a short compendium.
The Muggles Guide to Web3 Domain Registrations The muggles guide to Web3 domain registrations, a short compendium.
A Primer on Confidential Computing Confidential computing uses trusted hardware to encrypt data in memory.