Feeds to Scour
SubscribedAll
Scoured 9580 posts in 1.26 s
Looking for a Bulletproof Photo Backup Strategy (Unraid โ†’ Unraid? 3โ€‘2โ€‘1 Rule?)
reddit.comยท18hยท
Discuss: r/homelab
๐Ÿ’ฟBackup Strategies
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioยท7hยท
Discuss: DEV
๐Ÿ”Capability Systems
Preview
Report Post
What I Learned Building a Storage Engine That Outperforms RocksDB
tidesdb.comยท32mยท
Discuss: Hacker News
๐Ÿฆ€Rusty Databases
Preview
Report Post
Tangible Media: A Historical Collection of Information Storage Technology
tangiblemediacollection.comยท14hยท
Discuss: Hacker News
๐ŸบMedia Archaeology
Preview
Report Post
Zen-GC โ€“ policy-driven K8s garbage collection for automated cleanup
github.comยท6hยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Preview
Report Post
What Deep Learning Theory Teaches Us About AI Memory
dev.toยท1dยท
Discuss: DEV
๐Ÿง Learned Compression
Preview
Report Post
AI Has Made it Easy to Own Your Tools
jimmyhmiller.github.ioยท1d
๐Ÿค–Archive Automation
Preview
Report Post
LangChain core vulnerability allows prompt injection and data exposure
securityaffairs.comยท4h
๐ŸŒDNS Security
Preview
Report Post
What You Need to Know Before Touching a Video File
gist.github.comยท3hยท
Discuss: Hacker News
๐ŸŽฅStreaming Codecs
Preview
Report Post
Use Providable to check file histories
eclecticlight.coยท1d
๐Ÿ”—Data Provenance
Preview
Report Post
git rebase (Al Viro; Linus Torvalds; Theodore Tso)
yarchive.netยท1d
๐ŸŒณGit Internals
Preview
Report Post
A Validated Semantics for LLVM IR
sf.snu.ac.krยท11h
โœ…Formal Methods
Preview
Report Post
39C3: To sign or not to sign: Practical vulnerabilities in GPG & friends
media.ccc.deยท26mยท
๐Ÿ”“Hacking
Preview
Report Post
Bit rot and cloud storage (commercial or homelab)
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ Homelab Preservation
Preview
Report Post
Cracking the Code: A Walkthrough of the Fam Product Security Challenge
infosecwriteups.com
ยท2d
๐ŸงชBinary Fuzzing
Preview
Report Post
My First Step into Security: Building a Zero-Knowledge Vault
blog.thnkandgrow.comยท1d
๐Ÿ”Archive Encryption
Preview
Report Post
GHC 9.12.3 is now available
haskell.orgยท22h
๐Ÿ’งLiquidhaskell
Preview
Report Post
10 storage technologies that want to replace hard drives
techradar.com
ยท8h
๐ŸŒˆHolographic Archives
Preview
Report Post
From Intent to Proof: Dafny Verification for Web Apps
midspiral.comยท1dยท
๐Ÿ›๏ธAgda
Preview
Report Post