|
You are here |
www.shuttle.dev | ||
| | | | |
blog.christianposta.com
|
|
| | | | | The Model Context Protocol has created quite the buzz in the AI ecosystem at the moment, but as enterprise organizations look to adopt it, they are confronted with a hard truth: it lacks important security functionality. Up until now, as people experiment with Agentic AI and tool support, they've mostly adopted the MCP stdio transport, which means you end up with a 1:1 deployment of MCP server and MCP client. What organizations need is a way to deploy MCP servers remotely and leverage authorization to give resource owner's access to their data safely. | |
| | | | |
www.shuttle.rs
|
|
| | | | | Build an SSE-based MCP server with OAuth 2 in Rust using rmcp and Axum and deploy to Shuttle with PostgreSQL/SQLx. | |
| | | | |
robert.kra.hn
|
|
| | | | | Walkthrough of setting up a full web project that includes the setup for a web server (using axum) and a frontend (using wasm / yew). | |
| | | | |
github.com
|
|
| | | Contribute to NationalSecurityAgency/datawave-helm-charts development by creating an account on GitHub. | ||