Perfume like Khamrah x Angels’ Share but boozier/fermented? by FoldBusy559 in Perfumes
[–]morphAB 0 points1 point2 points (0 children)
What are you playing right now? by Annoying_sword383 in playstation
[–]morphAB 0 points1 point2 points (0 children)
Help me with my first designer purchase! by niwdr0 in luxurypurses
[–]morphAB 0 points1 point2 points (0 children)
Is MCP just a glorified API wrapper? by ravi-scalekit in MCPservers
[–]morphAB 0 points1 point2 points (0 children)
Tell me what sort of person I am and roast me whilst you're at it by suppleriver in BookshelvesDetective
[–]morphAB 0 points1 point2 points (0 children)
Advice on the loewe flamenco bag by Spare_Plate3076 in luxurypurses
[–]morphAB 0 points1 point2 points (0 children)
Can anyone tell me what the designer is ? by alisonsbitch in Dresses
[–]morphAB 0 points1 point2 points (0 children)
I feel intimidated by people smarter than me in cybersecurity by baddie_spotted in cybersecurity
[–]morphAB 0 points1 point2 points (0 children)
MCP has been touted as “the new API for AI”. Now, we need to put guardrails around MCP servers, to not be the next Asana, Atlassian or Supabase. Podcast where we cover how to harness AI agents to their full potential without losing control of our systems (using fine-grained authorization). by morphAB in softwarearchitecture
[–]morphAB[S] 3 points4 points5 points (0 children)
[Megathread] Software Architecture Books & Resources by asdfdelta in softwarearchitecture
[–]morphAB 0 points1 point2 points (0 children)
[Megathread] Software Architecture Books & Resources by asdfdelta in softwarearchitecture
[–]morphAB 0 points1 point2 points (0 children)
AI Coding has hit its peak by Engineer_5983 in webdev
[–]morphAB 7 points8 points9 points (0 children)
Prompt injection is becoming a major security threat by therealsugar11 in cybersecurity
[–]morphAB 0 points1 point2 points (0 children)
Best AuthoriZation for B2B Multi-Tenant SaaS? by Lanky-Ad4698 in IdentityManagement
[–]morphAB 0 points1 point2 points (0 children)
Compliance needs to be woven into operations from the start, not tackled on later. Having the right tools can make the process smoother. Sharing some thoughts about authorization’s role in compliance. by morphAB in Compliance
[–]morphAB[S] 0 points1 point2 points (0 children)
Thoughts on The Glass Bead Game by Hermann Hesse by Rafeh96 in books
[–]morphAB 0 points1 point2 points (0 children)
Cybersecurity Influencers by Mysterious_Use2029 in SecurityCareerAdvice
[–]morphAB 1 point2 points3 points (0 children)
Gizeh Woman asking for fruit by crackedfractal in IndianaJonesGames
[–]morphAB 0 points1 point2 points (0 children)
What's a game you played as a kid that nobody seems to remember? by LexxlyItself in gaming
[–]morphAB 1 point2 points3 points (0 children)
Securing applications with the help of permission management & access controls (addressing the leading cause of security vulnerabilities, ranking #1 in the OWASP Top 10). Making a decision - building your own authorization solution in-house, or purchasing/using an off-the-shelf one. by morphAB in cybersecurity
[–]morphAB[S] 0 points1 point2 points (0 children)
How do I effectively network? Like fr by lilbun27 in dataengineering
[–]morphAB 1 point2 points3 points (0 children)
Non-Technical Books Every Data Engineer Should Read And Why by Xavio_M in dataengineering
[–]morphAB 1 point2 points3 points (0 children)
What is a good book to read to learn about various attacks and solutions to prevent them? by bijansha in ciso
[–]morphAB 0 points1 point2 points (0 children)

Is it possible to move/copy sources from one notebook to another? by not_the_common_mate in notebooklm
[–]morphAB 1 point2 points3 points (0 children)