Skip to main content
X OPS360
Tech & Security Web Development Military Professional Development Health & Fitness Family Cooking
Research Series Glossary Media About Contribute
Topics
Tech & Security Web Development Military Professional Development Health & Fitness Family Cooking
Explore
Research Series Glossary Media About Contribute Search
Tech & Security

Tech & Security

Expert analysis on cybersecurity, artificial intelligence, encryption, networking, and emerging technology — bridging the gap between complex systems and practical understanding.

All Tech & SecurityWeb DevelopmentMilitaryProfessional DevelopmentHealth & FitnessFamilyCooking
Tech & Security Mar 13, 2026 5 min read

What If Security Meant Things Don't Exist?

A new security primitive for AI agent systems. Instead of hiding secrets behind locks, build systems where secrets only materialize inside protected execution boundaries.

Tech & Security Mar 3, 2026 5 min read

Stress-Testing a Formally Verified Production System

Part 8 of the PPOS series. Proofs tell you the system should work. Monte Carlo simulation tells you it does work. Under load, under failure, and under adversarial conditions.

Tech & Security Feb 25, 2026 5 min read

Crash-Proof Operations: Event Sourcing and Distributed Consistency for Manufacturing

Part 6 of the PPOS series. When your production system crashes mid-transaction, what happens to your data? Event sourcing and exactly-once semantics give you a deterministic answer.

Tech & Security Feb 22, 2026 4 min read

Your Production Floor Is a Cyber-Physical System (Act Like It)

Part 5 of the PPOS series. When you frame production operations as a discrete event system under supervisory control, you get formal safety guarantees that no amount of process documentation can provide.

Tech & Security Feb 19, 2026 4 min read

The NP-Hard Problem Hiding in Your Batch Schedule

Part 4 of the PPOS series. Optimal production batching reduces to bin packing, which is NP-hard. Here's what that means practically and how greedy heuristics get you close enough.

Tech & Security Feb 16, 2026 5 min read

Proving Your Workflow Can't Break: Invariant Theory for Production Systems

Part 3 of the PPOS series. Nine invariants that must hold at all times, proven to survive concurrent operations. This is what separates a workflow from a specification.

Tech & Security Feb 15, 2026 5 min read

Multi-Agent Authority Competition: When Substrates Fight for Dominance

Part 5 of the PDKS series. In any niche, multiple domains compete for authority. Replicator dynamics from evolutionary game theory reveal when equilibria exist, and when winner-take-all is inevitable.

Tech & Security Feb 13, 2026 5 min read

13 States, Zero Ambiguity: Designing a Production Lifecycle Automaton

Part 2 of the PPOS series. Every production workflow is secretly a finite state machine. Making it explicit eliminates the class of errors caused by 'I thought the rule was different.'

Tech & Security Feb 13, 2026 4 min read

OpenAI Won't Give You Your Data (Not Really)

You can export your ChatGPT conversations. You just can't read them. Here's why OpenAI's data export is technically compliant but practically useless, and what I did about it.

Tech & Security Feb 12, 2026 5 min read

Adversarial Robustness in Authority Systems: Perturbation Bounds and Spectral Stability

Part 4 of the PDKS series. When competitors, bots, or algorithm changes try to destabilize your authority, how much damage can they actually do? The math gives a bound.

Tech & Security Feb 6, 2026 5 min read

The Math of Authority Convergence: Contraction Mappings and Fixed Points

Part 2 of the PDKS series. Authority convergence isn't a hope. It's a provable property. Here's the contraction mapping that guarantees it, and what breaks the guarantee.

Tech & Security Feb 3, 2026 4 min read

Authority Is Not Emergent. It's Engineered

Part 1 of the PDKS series. In AI-mediated information economies, authority doesn't just happen. It converges, or fails to. Based on structural properties you can formally specify.

Tech & Security Feb 1, 2026 4 min read

Governing AI-Driven Software Change: Why the Control Plane Matters More Than the Model

AI can write code. Someone has to govern it. A framework for making AI-driven software changes safe, auditable, and usable at scale.

Tech & Security Jan 28, 2026 4 min read

Compression Through Understanding: Why Structural Entropy Beats Raw Storage

Part 3 of the Nemean Lion World Fabric series. When your system models the world perpetually, raw data storage grows without bound. Structural abstraction keeps it sublinear.

Tech & Security Jan 26, 2026 4 min read

Digital Twins Beyond Manufacturing: Modeling Workflows as Living Graphs

Part 3 of the Adaptive Enterprise series. Digital twin technology has transformed aerospace and manufacturing. Here's what happens when you apply it to business operations.

Tech & Security Jan 23, 2026 4 min read

Cross-System Impact Accountability: The Ledger No One Wants to Keep

Part 2 of the SPERA series. Every change to a system impacts other systems. Most organizations track this through memory and meetings. Here's how to track it through architecture.

Tech & Security Jan 21, 2026 4 min read

Byzantine-Resilient Model Aggregation: How to Trust a Network That Can't Trust Itself

Part 2 of the Nemean Lion World Fabric series. When you aggregate models from untrusted nodes, you need math, not faith. To guarantee convergence.

Tech & Security Jan 19, 2026 4 min read

Cybernetic Feedback Loops: What Stafford Beer Got Right in 1972

Part 2 of the Adaptive Enterprise series. The science of organizational adaptability was formalized fifty years ago. Most software still ignores it.

Tech & Security Jan 17, 2026 3 min read

Path-Dependent UX: How User Journey History Should Shape What They See

Part 2 of the SPC series. Classical web systems are Markovian. They react only to current state. What happens when you build systems that remember how users arrived?

Tech & Security Jan 14, 2026 4 min read

Why Digital Twins Need Causal Models, Not Just Correlations

Part 1 of the Nemean Lion World Fabric series. Most digital twins predict what will happen. Causal digital twins explain why, and that difference changes everything.

Tech & Security Feb 9, 2025 2 min read

Why Your Network Perimeter Is Already Gone: Zero Trust Architecture

The traditional castle-and-moat approach to network security is dead. Here's why zero trust isn't optional anymore and how to start implementing it.

XOPS360

Applied operations research & systems engineering.

Research Taxonomy Series Glossary Archive About Contribute Changelog RSS GitHub

© 2026 XOPS360 — Applied Operations Research. Built by Adam Bishop.