Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⚖️ Consistent Hashing
Distributed Systems, Load Distribution, Key Partitioning, DHT
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74785
posts in
883.3
ms
Climbing the
Pyramid
of
Lumma
Pain
vmray.com
·
4d
📈
Prometheus
Database
Schema
as Code Intelligence
dev.to
·
1d
·
Discuss:
DEV
🔥
DataFusion
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
1d
·
Discuss:
DEV
📡
SonarQube
Proteus
: Append-Only
Ledgers
for (Mostly) Trusted Execution Environments
arxiv.org
·
3d
🔄
Hardware Transactional Memory
Quantum Key Distribution with
Imperfections
: Recent Advances in Security
Proofs
arxiv.org
·
3d
⚛️
Quantum Computing
E2EE
Cloud storage for Linux with Open Source
Clients
?
discuss.privacyguides.net
·
5d
🌟
Pulsar
The
Arrival
Protocol:
Waking
the Spark in a New World
write.as
·
3d
📝
Write-Ahead Logging
Stop using 192.168.1.0/24: A
Contrarian
Guide to Home Network
Addressing
routerjockey.com
·
5d
🌐
Network Protocols
Fraud Doesn’t
Sleep
—Your Infrastructure Can’t
Either
cockroachlabs.com
·
5d
🐅
TigerBeetle Protocol
Sidestepping
Evaluation Awareness and
Anticipating
Misalignment with Production Evaluations
alignment.openai.com
·
4d
·
Discuss:
Hacker News
🚀
MLOps
Safe, Fast, and Scalable: Why
gRPC-Rust
Should Be Your Next
RPC
Framework
youtube.com
·
4d
·
Discuss:
r/rust
🔌
gRPC
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
4d
🦠
Malware Analysis
Off-site GitHub
backups
with client-side
encryption
backrepo.com
·
4d
·
Discuss:
Hacker News
🔒
Digital Privacy
As
Rocks
May Think
evjang.com
·
5d
·
Discuss:
Hacker News
,
r/programming
📱
Edge AI
Wirth
's
Revenge
jmoiron.net
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
⚡
LMAX Disruptor
Tools for
Recovering
RAID5
Disasters
github.com
·
4d
·
Discuss:
Hacker News
🎚️
Tiered Storage
Bulletproof
hosting providers
renting
cheap infrastructure to supply virtual machines to ransomware hackers
techradar.com
·
4d
🛡️
AMD SEV
Three-Round (Robust) Threshold
ECDSA
from Threshold
CL
Encryption
eprint.iacr.org
·
4d
🔐
Homomorphic Secret Sharing
**Abstract:** This paper proposes a novel framework,
HyperScore-Enabled
Autonomous Anomaly Mitigation (
HEAM
), for real-time anomaly detection and mitigation ...
freederia.com
·
3d
📈
Prometheus
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Launches Tool to Monitor Identity Behavior Across Business Applications
cysecurity.news
·
4d
·
Discuss:
Blogger
🔒
Security
Loading...
Loading more...
« Page 15
•
Page 17 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help