๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”„ Database Recovery

WAL Design, Checkpoint Mechanisms, Data Corruption, Point-in-time Recovery

Observability for Databases in CI/CD
blog.sonichigo.comยท7hยท
Discuss: Hacker News
๐Ÿ“ฆIn-process Databases
The Subtle Art of Taming Flows and Coroutines in Kotlin, or 'How Not to DDoS Yourself with Server-Sent Events'
cekrem.github.ioยท6hยท
Discuss: r/programming, r/webdev
๐ŸŒŠAsync Patterns
Smart Verification for Complex UCIe Multi-Die Architectures
semiwiki.comยท54m
โš™๏ธMechanical Sympathy
Drummer's Valkyrie 49B v2 - A finetune of Nemotron Super 49B v1.5, a pack puncher.
huggingface.coยท57mยท
Discuss: r/LocalLLaMA
๐Ÿ†•New AI
13 reasons SQL has got to go
infoworld.comยท8h
๐Ÿ’พDatabases
Testing: prevention vs discovery
pierrezemb.frยท17h
๐ŸŒฟLeptos
We know about malloc() and free() but they can be pretty slow. What if I told you there's a faster technique used for high-performance C programming?
threadreaderapp.comยท1h
๐Ÿง Memory Allocators
BigQuery under the hood: The power of the Column Metadata index aka CMETA
cloud.google.comยท1h
โš™๏ธDatabase Internals
Hashed sorting is typically faster than hash tables
reiner.orgยท9hยท
Discuss: Lobsters, Hacker News, r/rust
๐ŸŒณData Structures
RUSTSEC-2025-0062: Vulnerability in toodee
rustsec.orgยท5h
๐Ÿฆ€Rust
How Grab Built An Authentication System for 180+ Million Users
blog.bytebytego.comยท2h
๐Ÿ”ŒAPI Design Theory
IBM Power Processor, This One Goes to 11
semiengineering.comยท10h
๐Ÿ–ฅ๏ธHardware Architecture
Evaluating NL2SQL via SQL2NL
arxiv.orgยท13h
๐Ÿ”Query Optimization
Using Claude Code to modernize a forgotten Linux kernel driver
dmitrybrant.comยท18hยท
Discuss: Lobsters, Hacker News
๐Ÿ’ซIO_uring
A practical guide to error handling in Go
datadoghq.comยท17h
๐ŸŒŠAsync Patterns
Team discovers hidden structures, invisible in traditional seismic scans, that block the pumping of oil
phys.orgยท4h
โš›๏ธPhysics
SynchDB 1.2 Released - Native Oracle Connector, Enhanced Monitoring & Quick Deployment Tools
postgresql.orgยท17h
๐Ÿ’งLitestream
Hackers access Burger King systems with ease
techzine.euยท4h
๐Ÿ”“Hacking
Building consent reform: how digital technology can make new liability rules watertight
theconversation.comยท18h
โš–๏ธTech Regulation
'Make invalid states representable' considered harmful
seangoedecke.comยท17hยท
Discuss: Lobsters, Hacker News
๐Ÿ’พBinary Formats
Loading...Loading more...
AboutBlogChangelogRoadmap