๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Archive Combinators

Preservation Composition, Storage Abstractions, Format Pipelines, Data Transformations

Motion Pixels: breakthrough!
codecs.multimedia.cxยท12h
๐ŸŽฌVideo Codecs
Malicious AI-generated npm package hits Solana users
securityaffairs.comยท8h
๐Ÿ›ก๏ธWASM Sandboxing
Deploying AMD Instead of Arm in our Infrastructure 2025 Here is Why
servethehome.comยท13h
๐Ÿ Homelab Archaeology
Back from Display Next Hackfest 2025
bootlin.comยท1d
๐Ÿ–ฅ๏ธTerminal Renaissance
A Comprehensive Review of JFS (Journaled File System)
machaddr.substack.comยท4dยท
Discuss: Substack
๐Ÿ—„๏ธFile Systems
A Complete Guide to etcd: The Distributed Key-Value Store Powering Cloud Infrastructure
blog.devops.devยท4d
๐Ÿ HomeLab
Deep research for healthcare revenue cycle
writing.kunle.appยท16hยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
Authenticating GitHub Actions without API keys
oblique.securityยท1dยท
Discuss: r/programming
๐Ÿ”PKI Archaeology
10 Surprising Things You Can Do with Pythonโ€™s time module
kdnuggets.comยท18h
โš™๏ธWASM Runtime
SpecTree: Composable Context Engineering for LLMs
fuzzycomputer.comยท4dยท
Discuss: Hacker News
โš™๏ธOperational Semantics
Blog series on creating an OS in Rust
os.phil-opp.comยท2dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Data Labeling Is the Hot New Thing in AI
spectrum.ieee.orgยท17hยท
Discuss: r/technews
๐Ÿค–AI Curation
Glibc 2.42 Lands with New Features, CVE Fixes, and Performance Gains
linuxiac.comยท3d
๐Ÿ”ฉSystems Programming
๐Ÿง˜ Code Like Krishna Said: 'To Work You Have the Right, But Not the Fruits Thereof'
dev.toยท14hยท
Discuss: DEV
๐Ÿ“ฆGit LFS
Top Tools for Enterprise Data Analytics on Snowflake
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Archive Automation
TraceRoot: Find the Root Cause in Your Code's Trace
github.comยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ‘๏ธSystem Observability
RestoreAI - Pattern-based Risk Estimation Of Remaining Explosives
arxiv.orgยท4d
๐Ÿ”Vector Forensics
Benefits and Features of Using OpenBSD
discoverbsd.comยท3d
๐Ÿ”ŒOperating system internals
Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security
arxiv.orgยท3d
๐ŸŽฏThreat Hunting
๐Ÿ› ๏ธ How I Migrated Data from Solr to Elasticsearch Using Python
dev.toยท4dยท
Discuss: DEV
๐ŸššData Migration
Loading...Loading more...
AboutBlogChangelogRoadmap