{R}R 開発ノート


合計 19 件の記事が見つかりました。

The Engineering of Intent, Chapter 1: The Triadic Relationship Model

Chapter 1 of The Engineering of Intent blog series. Software used to be a dyad between engineer and machine. Now a third actor — the AI agent — has joined permanently. A teaser covering the Triadic Relationship Model, the CMDP view of software, and the six failure modes every AI-native team needs to name.
2026-04-17

Chapter 20: Passwordless Authentication — Passkeys, WebAuthn, and the End of the Password

Chapter 20 of the OpenID: Modern Identity series — passwordless authentication: passkeys as friendly public-key credentials, WebAuthn as the underlying browser API, and the FIDO2 ecosystem including hardware security keys.
2026-03-26

OpenClaw Engineering, Chapter 11: Continuous Learning with OpenClaw-RL

How OpenClaw-RL extracts training signals from conversations and uses them to improve agent behavior continuously. From binary feedback to token-level distillation, agents learn from every interaction without retraining the base model.
2026-03-26

Chapter 15: FAPI and High-Stakes Security — When the Defaults Aren't Enough

Chapter 15 of the OpenID: Modern Identity series — FAPI for high-stakes scenarios: what FAPI 1.0 Advanced and 2.0 require, Pushed Authorization Requests (PAR), JWT-Secured Authorization Requests (JAR), and migrating from FAPI 1.0 Advanced to FAPI 2.0.
2026-03-21

Chapter 14: Hardening Your Identity Stack — Setting the Defaults That Keep You Safe

Chapter 14 of the OpenID: Modern Identity series — hardening defaults that neutralize common attacks: strict redirect URI matching, audience validation to solve the confused deputy problem, token lifetime tuning, and refresh token binding, rotation, and revocation.
2026-03-20

Chapter 13: Threat Modeling OpenID Systems — Thinking Like the Adversary

Chapter 13 of the OpenID: Modern Identity series — threat modeling for OIDC systems: token theft vectors and defenses, replay attacks and nonce validation, CSRF and state parameter mismanagement, redirect abuse and mix-up attacks.
2026-03-19

Chapter 17 – Guardrails and Governance

Chapter 17 of Master Claude Chat, Cowork and Code moves from understanding risks to implementing controls — permission isolation, tool allow-lists, human-in-the-loop approval workflows, validation hooks, and enterprise-grade audit logging.
2026-03-18

Chapter 12: User Lifecycle Management — Provisioning, SCIM, and the De-Provisioning Problem

Chapter 12 of the OpenID: Modern Identity series — user lifecycle management: JIT and bulk provisioning, SCIM for cross-system sync, de-provisioning done right, role mapping from IdP claims, and identity architecture for multi-tenant SaaS.
2026-03-18

Chapter 16 – Execution Risks and Isolation

Chapter 16 of Master Claude Chat, Cowork and Code confronts the real security risks of AI systems that execute commands and manipulate files — from command injection to data exposure — and explains the isolation models that keep things safe.
2026-03-17

Chapter 15 – Managing Context Rot and Entropy

Chapter 15 of Master Claude Chat, Cowork and Code tackles the silent failure mode of long-running AI sessions — context rot. Learn strategies for context compression, structured state management, and thinking like an operations team to keep Claude sharp over time.
2026-03-16

Chapter 10: Single Sign-On at Scale — Identity as Infrastructure

Chapter 10 of the OpenID: Modern Identity series — running identity at organizational scale: corporate IdPs (AD, Entra ID), the CIAM vendor ecosystem (Okta, Auth0, Entra ID), multi-tenant isolation, account linking, and external user access.
2026-03-16

Chapter 3: Core Concepts — The Vocabulary of OpenID Connect

Chapter 3 of the OpenID: Modern Identity series — the IdP/RP/user triangle, claims and JWTs, the three OIDC token types, consent and scopes, sessions vs tokens, and the boundary between authentication and authorization.
2026-03-09

Chapter 7: Plugins and Domain Specialization — Turning Claude Into Your Organization's Expert

Chapter 7 of Master Claude Chat, Cowork and Code explores how plugins transform Claude from a generalist into a domain expert — with pre-built plugins for Sales, Finance, Marketing, and Legal, slash commands, and organization-managed customization.
2026-03-08

Chapter 2: From OpenID to OpenID Connect — How the Industry Got This One Right

Chapter 2 of the OpenID: Modern Identity series — tracing how the industry moved from the original OpenID and SAML through OAuth 2.0 to OpenID Connect, and when to reach for each standard.
2026-03-08

Chapter 1: Why Identity Is Hard — The Trust Problem Behind Every Login

Chapter 1 of the OpenID: Modern Identity book series — why identity is a trust problem first and a technology problem second, and why authentication and authorization must never be conflated.
2026-03-07

OpenID: Modern Identity for Developers and Architects — A 22-Part Blog Series

Introduction and index for the 22-part blog series based on OpenID: Modern Identity for Developers and Architects by Sho Shimoda — with links to every chapter from Why Identity Is Hard through Identity in AI Systems.
2026-03-06

Art of Coding, Part VII: Beyond Today

Introduction to Part VII. As AI writes more code, what becomes the engineer's irreplaceable role? A look at how automation transforms—but doesn't diminish—the craft.
2026-01-14

6.3 Applications in ML, Statistics, and Kernel Methods

A deep, intuitive explanation of how Cholesky decomposition powers real machine learning and statistical systems—from Gaussian processes and Bayesian inference to kernel methods, Kalman filters, covariance modeling, and quadratic optimization. Understand why Cholesky is essential for stability, speed, and large-scale computation.
2025-09-30

6.2 Memory Advantages

A detailed, intuitive explanation of why Cholesky decomposition uses half the memory of LU decomposition, how memory locality accelerates computation, and why this efficiency makes Cholesky essential for large-scale machine learning, kernel methods, and statistical modeling.
2025-09-29