<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cloud Architecture on MacWorks</title><link>https://macworks.dev/tags/cloud-architecture/</link><description>Recent content in Cloud Architecture on MacWorks</description><generator>Hugo</generator><language>en</language><atom:link href="https://macworks.dev/tags/cloud-architecture/index.xml" rel="self" type="application/rss+xml"/><item><title>Tech Company Blogs</title><link>https://macworks.dev/docs/week/tech/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/tech/</guid><description>&lt;h1 id="engineering--scale--week-of-2026-05-08-to-2026-05-15"&gt;Engineering @ Scale — Week of 2026-05-08 to 2026-05-15&lt;a class="anchor" href="#engineering--scale--week-of-2026-05-08-to-2026-05-15"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="week-in-review"&gt;Week in Review&lt;a class="anchor" href="#week-in-review"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The industry is rapidly transitioning from prioritizing raw LLM capabilities to focusing heavily on &amp;ldquo;agent harnesses&amp;rdquo;—strict, deterministic execution environments that bound AI autonomy. Concurrently, engineering organizations managing extreme distributed scale are fighting latency ceilings by abandoning synchronous polling in favor of asynchronous, optimistic batching and fully decoupled state architectures.&lt;/p&gt;
&lt;h2 id="top-stories"&gt;Top Stories&lt;a class="anchor" href="#top-stories"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="#"&gt;Building the Agent Harness: Securing Autonomy with Zero-Trust Execution&lt;/a&gt;&lt;/strong&gt; · HashiCorp, Pinterest, O&amp;rsquo;Reilly · &lt;a href="#"&gt;Source&lt;/a&gt;
Deploying autonomous agents into enterprise systems requires treating them as hostile, untrusted actors. HashiCorp Vault introduced ephemeral, per-request JWTs with strict &amp;ldquo;ceiling policies&amp;rdquo; embedded directly in the authorization claims to bound AI blast radii. Similarly, Pinterest bypassed local developer servers, deploying Envoy proxies and decorator-level RBAC to secure their internal Model Context Protocol (MCP) ecosystem at the network edge. This signals a structural shift toward deploying &amp;ldquo;Mirrors&amp;rdquo; (read-only systems) and strictly isolated &amp;ldquo;Gyms&amp;rdquo; rather than granting open write-access to autonomous agents.&lt;/p&gt;</description></item><item><title>2026-05-12</title><link>https://macworks.dev/docs/archives/tech/tech-2026-05-12/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/archives/tech/tech-2026-05-12/</guid><description>&lt;details&gt;
&lt;summary&gt;Sources&lt;/summary&gt;
&lt;div class="markdown-inner"&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href="https://medium.com/feed/airbnb-engineering"&gt;Airbnb Engineering&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/machine-learning/feed/"&gt;Amazon AWS AI Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://aws.amazon.com/cn/blogs/architecture/feed/"&gt;AWS Architecture Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/opensource/feed/"&gt;AWS Open Source Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://brett.trpstra.net/brettterpstra"&gt;BrettTerpstra.com&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blog.bytebytego.com/feed"&gt;ByteByteGo&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blog.cloudflare.com/rss/"&gt;CloudFlare&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://dropbox.tech/feed"&gt;Dropbox Tech Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://engineering.fb.com/feed/"&gt;Facebook Code&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://github.blog/engineering.atom"&gt;GitHub Engineering&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blog.google/innovation-and-ai/technology/ai/rss/"&gt;Google AI Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://deepmind.google/blog/rss.xml"&gt;Google DeepMind&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://feeds.feedburner.com/GoogleOpenSourceBlog"&gt;Google Open Source Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.hashicorp.com/blog/feed.xml"&gt;HashiCorp Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://feed.infoq.com/?token=XQ47eEiAJqUtN8043NhEqJ6kZB8XallO"&gt;InfoQ&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://engineering.atspotify.com/feed/"&gt;Spotify Engineering&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.microsoft.com/en-us/research/feed/"&gt;Microsoft Research&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://hacks.mozilla.org/feed/"&gt;Mozilla Hacks&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://netflixtechblog.com/feed"&gt;Netflix Tech Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://feeds.feedburner.com/nvidiablog"&gt;NVIDIA Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://feeds.feedburner.com/oreilly/radar/atom"&gt;O&amp;#39;Reilly Radar&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://openai.com/news/rss.xml"&gt;OpenAI Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://developers.soundcloud.com/blog/blog.rss"&gt;SoundCloud Backstage Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://stripe.com/blog/feed.rss"&gt;Stripe Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://rsshub.bestblogs.dev/deeplearning/the-batch"&gt;The Batch | DeepLearning.AI | AI News &amp;amp; Insights&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blog.dropbox.com/feed"&gt;The Dropbox Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://github.blog/feed/"&gt;The GitHub Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://medium.com/feed/netflix-techblog"&gt;The Netflix Tech Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blogs.microsoft.com/feed/"&gt;The Official Microsoft Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://vercel.com/atom"&gt;Vercel Blog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://engineeringblog.yelp.com/feed.xml"&gt;Yelp Engineering and Product Blog&lt;/a&gt;&lt;/li&gt;

&lt;/ul&gt;
&lt;/div&gt;
&lt;/details&gt;


&lt;h1 id="engineering--scale--2026-05-12"&gt;Engineering @ Scale — 2026-05-12&lt;a class="anchor" href="#engineering--scale--2026-05-12"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="signal-of-the-day"&gt;Signal of the Day&lt;a class="anchor" href="#signal-of-the-day"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The shift from LLM assistants to autonomous agents is forcing a fundamental redesign of enterprise authorization and execution environments. As seen across HashiCorp, SAP, and emerging architectural patterns, granting agents write-access requires strict, ephemeral per-request JWTs, deterministic ceiling policies, and hardened runtime sandboxes to prevent bounded agents from becoming massive exfiltration risks.&lt;/p&gt;</description></item></channel></rss>