Topic

Architecture

19 cairns tagged "architecture"

Boundary Objects for Operational Software

How ECOs, job numbers, statuses, and timelines carry meaning across teams that do not share a tool

domain operations

How Conduit is Shaped

The architecture that lets one consumer site read N project repos without coupling either side to the other

devops ai tools

The Last False Complete

Why field workflows need a soft-complete state before they earn the right to be done

workflow operations

From Intake Folder to Project Memory

A design pack for turning KCCI project folders into a managed, searchable, auditable knowledge system

ai tools

Three Gates, One Identity

How Osprey Strike authenticates browsers, webhooks, and upstream APIs without collapsing them into one trust boundary

security devops

Three Memories, One Q

Why the current OpenClaw design keeps long-term memory private to each lane and shares knowledge through docs instead

security ai tools

The Only Locked Door

How OpenClaw gives Q a real computer without letting public channels rewrite the machine it runs on

security ai tools

Two Tenants, One ECO

Why Osprey Strike needs a two-dimensional tenancy model instead of a generic SaaS checkbox

domain security

Surviving the Upgrade

What happens when the ground shifts under a running AI agent — and how three days of misdiagnosis led to a five-minute fix

devops ai tools security

Timbers

A Development Ledger for the Age of AI Agents

ai tools devops

The Lakehouse

What Osprey Vantage is actually building, and why it looks the way it does

domain business

When the Fiber Goes Dark

The emergency callout problem in outside plant fiber construction

domain business

What's Next

Where Osprey Strike stands today, what's coming, and the questions that still need answers

business domain

The Shape of the System

How Osprey Strike is structured, from mono-repo to multi-tenant

domain devops

The Memory Problem

Why AI Agents Forget Everything and What To Do About It

ai tools

The Injection Problem

Defending LLM agents against prompt injection when they read the world

security ai

The ECO Lifecycle

From outage detection to field resolution — how an emergency callout moves through the system

domain

Running in Production

From Cloudflare edge to PostgreSQL — how Osprey Strike deploys, authenticates, and scales

devops security

Events All the Way Down

Event sourcing and CQRS in Osprey Strike — the architecture, the migration, and the escape hatch

domain

← Back to Library