LogoSub-Microseconds
Login
Subscribe
Oliver Buchannon
thanh ngo

memory-latency

+13

Building a Disruptor in Rust: Ryuo — Part 3A: Memory Ordering Fundamentals

Mar 28, 2026

•

19 min read

Building a Disruptor in Rust: Ryuo — Part 3A: Memory Ordering Fundamentals

Series: Building a Disruptor in Rust: Ryuo

thanh ngo
thanh ngo

low-latency

+12

Building a Disruptor in Rust: Ryuo — Part 2B: Cache-Line Padding

Mar 13, 2026

•

16 min read

Building a Disruptor in Rust: Ryuo — Part 2B: Cache-Line Padding

thanh ngo
thanh ngo

low-latency

+7

Building a Disruptor in Rust: Ryuo — Part 2A: The Ring Buffer

Mar 6, 2026

•

13 min read

Building a Disruptor in Rust: Ryuo — Part 2A: The Ring Buffer

thanh ngo
thanh ngo

low-latency

+7

Building a Disruptor in Rust: Ryuo

Feb 28, 2026

•

3 min read

Building a Disruptor in Rust: Ryuo

A 16-part series on sub-microsecond messaging

thanh ngo
thanh ngo

memory-latency

+12

Building a Disruptor in Rust: Ryuo — Part 1: Why Queues Are Killing Your Latency

Feb 28, 2026

•

20 min read

Building a Disruptor in Rust: Ryuo — Part 1: Why Queues Are Killing Your Latency

thanh ngo
thanh ngo

authz

+5

Post 12 — Final Model and Invariants

Jan 30, 2026

•

22 min read

Post 12 — Final Model and Invariants

Series: Building Enma — From Rules to Relations Part 12 of 12: Freezing semantics so independent implementations converge

thanh ngo
thanh ngo

authz

+5

Post 11B — Production Deployment: Revisions at Scale

Jan 30, 2026

•

14 min read

Post 11B — Production Deployment: Revisions at Scale

Series: Building Enma — From Rules to Relations Part 11B of 12: Operational concerns for revision-based authorization

thanh ngo
thanh ngo

authz

+5

Post 11A — Revision-Based Snapshots

Jan 29, 2026

•

12 min read

Post 11A — Revision-Based Snapshots

Series: Building Enma — From Rules to Relations Part 11A of 12: Snapshot isolation for distributed authorization

thanh ngo
thanh ngo

authz

+5

Post 10B — Budget Limits and DoS Protection

Jan 1, 2026

•

13 min read

Post 10B — Budget Limits and DoS Protection

Series: Building Enma — From Rules to Relations Part 10B of 12: Bounded evaluation prevents resource exhaustion

thanh ngo
thanh ngo

authz

+5

Post 10A — Fail-Safe Defaults: Unknown Caveats and Duplicates

Dec 28, 2025

•

12 min read

Post 10A — Fail-Safe Defaults: Unknown Caveats and Duplicates

Series: Building Enma — From Rules to Relations Part 10A of 12: When things go wrong, deny access

thanh ngo
thanh ngo

authz

+5

Post 9 — Determinism and Tie-Breaks

Dec 18, 2025

•

27 min read

Post 9 — Determinism and Tie-Breaks

Series: Building Enma — From Rules to Relations Part 9 of 12: When two evaluators must always agree

thanh ngo
thanh ngo

authz

+5

Post 8 — Schema-Level Safety Nets

Dec 12, 2025

•

24 min read

Post 8 — Schema-Level Safety Nets

Series: Building Enma — From Rules to Relations Part 8 of 12: When all tuples must obey mandatory policies

thanh ngo
thanh ngo
Post 7B — Composite Caveats and Safety Measures

Dec 7, 2025

•

19 min read

Post 7B — Composite Caveats and Safety Measures

Series: Building Enma — From Rules to Relations Part 7B of 12: Building production-ready complex caveats with observability and safety

thanh ngo
thanh ngo

authz

+5

Post 7A — Complex Boolean Logic (ABAC v2)

Nov 27, 2025

•

23 min read

Post 7A — Complex Boolean Logic (ABAC v2)

Series: Building Enma — From Rules to Relations Part 7A of 12: When access requires multi-predicate conditions and dynamic computations

thanh ngo
thanh ngo

authz

+4

Post 6 — Organization-Scoped Conditions

Nov 20, 2025

•

23 min read

Post 6 — Organization-Scoped Conditions

Series: Building Enma — From Rules to Relations Part 6: When permissions depend on attribute matching between users and resources

thanh ngo
thanh ngo

authz

+5

📚 Enma — From Rules to Relations (Complete 12-Part Series Index)

Nov 15, 2025

•

6 min read

📚 Enma — From Rules to Relations (Complete 12-Part Series Index)

A deep technical journey through modern authorization: RBAC → ReBAC → ABAC → Zanzibar.

thanh ngo
thanh ngo

authz

+4

Post 5 — Conditional Access (ABAC v1)

Nov 13, 2025

•

27 min read

Post 5 — Conditional Access (ABAC v1)

Series: Building Enma — From Rules to Relations Part 5: When permissions depend on context, not just identity

thanh ngo
thanh ngo

authz

+3

Post 4 — Hierarchies and Inheritance (ReBAC v2)

Nov 6, 2025

•

19 min read

Post 4 — Hierarchies and Inheritance (ReBAC v2)

Series: Building Enma — From Rules to Relations. Part 4: When permissions flow across object boundaries

thanh ngo
thanh ngo

authz

+3

Post 3 — From Roles to Relationships (ReBAC v1)

Oct 30, 2025

•

23 min read

Post 3 — From Roles to Relationships (ReBAC v1)

Series: Building Enma — From Rules to Relations Part 3: When permissions depend on object relationships, not global roles

thanh ngo
thanh ngo

authz

+4

Post 2 — Modeling Roles and Memberships

Oct 22, 2025

•

9 min read

Post 2 — Modeling Roles and Memberships

Series: Building Enma — From Rules to Relations. Part 2: From direct permissions to role-based access control

thanh ngo
thanh ngo
Post 1 — Why Traditional Authorization Breaks at Scale

Oct 18, 2025

•

11 min read

Post 1 — Why Traditional Authorization Breaks at Scale

Series: Building Enma — From Rules to Relations Part 1: The foundation of modern authorization

thanh ngo
thanh ngo

ScienceAndSpirituality

+9

Quantum Universe, Simulation, and Buddhist Wisdom

Oct 15, 2025

•

6 min read

Quantum Universe, Simulation, and Buddhist Wisdom

A dialogue between science and consciousness

thanh ngo
thanh ngo

ScienceAndSpirituality

+9

Vũ Trụ Lượng Tử, Giả Lập, và Phật Pháp

Oct 15, 2025

•

11 min read

Vũ Trụ Lượng Tử, Giả Lập, và Phật Pháp

Một cuộc đối thoại giữa khoa học và tâm thức

thanh ngo
thanh ngo

Order Book

+4

Node256 in Action: Building an Order Book Test Ground

Aug 13, 2025

•

7 min read

Node256 in Action: Building an Order Book Test Ground

thanh ngo
thanh ngo

Benchmark

+8

Scaling Past Simplicity: Why Node48 Needs a Different Design

Aug 4, 2025

•

7 min read

Scaling Past Simplicity: Why Node48 Needs a Different Design

thanh ngo
thanh ngo
Load more
Sub-Microseconds

Sub-Microseconds

Where milliseconds matter and boundaries are meant to be broken—HFT redefined.


Home

© 2026 Sub-Microseconds.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv