Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐พ Database Checkpointing
Specific
Recovery, WAL, Crash Consistency, Durability
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28882
posts in
130.9
ms
From Detection to Recovery:
Operational
Analysis on LLM Pre-training with 504
GPUs
ย
๐๏ธ
LLM Infrastructure
arxiv.org
ยท
19h
eOS-DeepContext
ย
๐๏ธ
LLM Infrastructure
eoscontinuum.com
ยท
4d
The
wal
_level You Set Is Not the
wal
_level You Get
ย
๐
SQLite WAL
thebuild.com
ยท
1d
The Shape of
Duplicate
Detection: Benchmarking 4000+ Measurements Across Key Types and
Backends
ย
๐ธ
Bloom Filters
dubeykartikay.com
ยท
16h
ยท
Hacker News
,
r/cpp
,
r/programming
How to make and
roll
back to a
snapshot
ย
๐
MVCC
eclecticlight.co
ยท
5d
Dell
SupportAssist
update is crashing PCs with constant blue screens and reboot loops โ the boot service built for system recovery is the culprit of
unending
instability
ย
๐
Hardware Security
tomshardware.com
ยท
11h
ยท
r/Windows11
Durable
handoffs
for multi-agent pipelines
ย
๐ค
Multi-Agent Orchestration
journal.resonatehq.io
ยท
6d
Microsoft Tests Point-in-Time
Restore
for Windows 11, a Full System
Backup
Beyond Classic System
Restore
ย
๐
Database Recovery
ghacks.net
ยท
5d
Why ransomware attacks
succeed
even when
backups
exist
ย
๐พ
Persistence Strategies
bleepingcomputer.com
ยท
6d
Forensic analysis of video data
deletion
and recovery in
Honeywell
surveillance file system
ย
๐
Binary Analysis
arxiv.org
ยท
1d
Three
spaces
of
context
ย
๐จ
Design Tokens
trm.bearblog.dev
ยท
5d
Debugging the
Debuggers
:
Failure-Anchored
Structured Recovery for Software Engineering Agents
ย
๐พ
Persistence Strategies
arxiv.org
ยท
19h
Webinar
: Why modern attacks
require
both security and recovery
ย
๐ฏ
Security Conference Talks
bleepingcomputer.com
ยท
5d
RePO-VLA
: Recovery-Driven Policy Optimization for Vision-Language-Action Models
ย
๐ก๏ธ
AI Safety
arxiv.org
ยท
19h
Benchmarking Large Language Models for
IoC
Recovery under Adversarial Code
Obfuscation
and Encryption
ย
๐ก๏ธ
AI Security
arxiv.org
ยท
1d
New
Cisco
DoS flaw
requires
manual reboot to revive devices
ย
๐ฉ
CTF Writeups
bleepingcomputer.com
ยท
6d
ProactBench
: Beyond What The User
Asked
For
ย
๐ช
Prompt Engineering
arxiv.org
ยท
19h
OCRR
: A Benchmark for Online
Correction
Recovery under Distribution Shift
ย
๐ฏ
Vector Quantization
arxiv.org
ยท
6d
A Multi-Agent
Consensus
Protocol for Stable Software
Remodularization
ย
๐
Eventual Consistency
arxiv.org
ยท
5d
Joint Design of Piggyback and
Conjugate
Transformation Functions for Repair Bandwidth Reduction in
Piggybacking
Codes
ย
๐๏ธ
Vector Compression
arxiv.org
ยท
6d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help