02 / Writing

Technical Articles

Articles, tutorials, and deep dives on authorization, AI security, cloud architectures, and natural language processing.

Build Permission-Aware RAG with the SpiceDB Testcontainer

How to pair SpiceDB with Testcontainers to test your permission logic inside a RAG pipeline, end-to-end, automatically, with zero infrastructure dependencies.

Read the article →
AuthZed Blog · 2025

Build a Production-Grade Agentic RAG System Using AuthZed Cloud

How to construct a secure AI-powered retrieval system where authorization checks are hardcoded into the LangGraph pipeline — preventing agents from bypassing permissions rather than relying on prompt instructions.

AuthZed Blog · 2025

Introducing the LangChain SpiceDB Integration

Announcing langchain-spicedb, a library that integrates SpiceDB's relationship-based access control into LangChain and LangGraph workflows, enabling post-retrieval filtering so users only see documents they're authorized to access.

Pinecone · Jan 2026

Securing Knowledge Retrieval using SpiceDB and ReBAC

How to model permissions and apply access control before and after retrieval in a RAG pipeline built with Pinecone, SpiceDB, and OpenAI embeddings.

AuthZed Blog · Feb 2026

Policy Engines Don't Work for AI Authorization

Cedar and other policy engines don't work for AI agent authorization. Here's why, and what to use instead.

Dev.to · Jan 2025

Don't use JWT for Authorization!

Why JSON Web Tokens might not be your best friend for authorization, and the rare cases where they actually make sense.

AuthZed Blog · Nov 2025

A Timeline of Model Context Protocol (MCP) Security Breaches

AI fundamentally changes the interface, but not the fundamentals of security. A look at MCP breaches and what they teach us.

Dev.to · Jan 2025

Safeguarding Your Data When Using DeepSeek R1 In RAG Pipelines

Secure your RAG pipelines with fine-grained authorization while making your queries more secure and efficient.

AuthZed Blog · Dec 2024

Deploy SpiceDB to Amazon ECS

Amazon ECS is a fully managed container orchestration service. How to deploy SpiceDB to ECS — and why you probably shouldn't in prod.

Dev.to · Mar 2025

Beware of the New Enemy Problem

A scenario where unauthorized access can occur when permission changes and the resources they protect aren't updated together consistently.

Fermyon Blog · June 2024

SpinKube & Flux on Kubernetes v1.30

Guide to automated deployments using SpinKube with Flux for modern Kubernetes environments.

LinuxMag · March 2022

Open Source and The Cloud (Dutch)

Exploring the future of IT through the combination of open source technologies and cloud computing.

Emerce NL · July 2021

Busting Common Myths about Lock-In (Dutch)

Addressing misconceptions about cloud provider lock-in and how to maintain freedom of choice in cloud computing.

Blogit NL · August 2021

The Cloud Offers Freedom of Choice (Dutch)

How cloud computing provides businesses with flexibility and choice in their technology decisions.

GadgetsNow · August 2018

The Science Behind Voice Interfaces

Deep dive into the technology that powers voice user interfaces, covering speech recognition, NLP, and machine learning.

GadgetsNow · July 2018

Voice Interfaces Will Lower Barriers to Technology

How voice interfaces make technology more accessible and reduce the learning curve for users across different demographics.

Economic Times · December 2018

What Does It Mean for Your Brand in a Voice-Centric World

Strategic insights for businesses on adapting to voice technology and creating voice-first brand experiences.

AuthZed Docs

AuthZed / SpiceDB Documentation

Contributed to the official documentation for AuthZed and SpiceDB.

Fermyon Developer Docs

Fermyon Developer Documentation

Contributed to the developer docs for Fermyon.

Gupshup Developer Docs

Gupshup Developer Documentation

Contributed to the developer documentation for Gupshup