</>
the vector
HomeBlog
Sign in

Blog

Entries on system architecture, intent-driven development, and the evolving role of the engineer.

SQLPrivacyHIPAAPHISHA-256Intermediate

Beyond the Scrub: A Technical Guide to De-identification in SQL

Moving from raw PHI to a HIPAA-compliant dataset requires more than just dropping columns. In this guide, we explore the SQL implementation of Safe Harbor de-identification, the nuances of salted SHA-256 hashing, and the critical architectural differences between De-identified and Limited Data Sets.

Kanakadurga KunamneniKanakadurga KunamneniApril 2, 20264 min
</>
the vector

Documenting the shift from writing code to directing intent. Magnitude is AI output; direction is human architecture.

@thevector_dev·@thevector.dev

Navigate

  • Home
  • Blog
  • Dashboard

For machines

  • llms.txt
  • llms-full.txt
  • /api/posts
  • RSS Feed

© 2026 the vector . Built with Next.js.

thevector.dev

This is a personal, non-profit archive created for educational and professional development purposes. It does not generate revenue, offer services, or constitute a business entity. All views expressed are strictly my own.