🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ›‘οΈ Archive Verification

Formal Proofs, Storage Correctness, Integrity Checking, Preservation Logic

Sound and Solution-Complete CCBS
arxiv.orgΒ·2h
πŸ›‘οΈPreservation Proofs
Capture Checking in Scala
nrinaudo.github.ioΒ·42mΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Some recent project milestones
markjgsmith.comΒ·10h
πŸ”ŒInterface Evolution
DCP-o-matic β€’ Re: Veriying DCP on Synology NAS via CLI
dcpomatic.comΒ·5h
βœ…FLAC Verification
JavaScript lib for exchanging selective disclosure proofs
github.comΒ·1dΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Looking for Suggestions on Home Server for running Game Servers
reddit.comΒ·6hΒ·
Discuss: r/homelab
πŸ¦€Embedded Rust
Abhinav Sarkar: A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.netΒ·1d
πŸ”—Functional Compilers
Exactly-Once Processing Across Kafka and Databases: Using Kafka Transactions + Idempotent Writes
medium.comΒ·15hΒ·
Discuss: r/programming
🌊Apache Kafka
Automate the Testing of Your LLM Prompts
dev.toΒ·6hΒ·
Discuss: DEV
⚑Proof Automation
How Should a CMS Repository Understand the Content Within It?
deanebarker.netΒ·1dΒ·
Discuss: Hacker News
πŸ—„οΈDatabase Internals
Permacomputing
inkdroid.orgΒ·2d
🧲Magnetic Philosophy
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·1dΒ·
Discuss: www.blogger.com
🎯Threat Hunting
Dealing With the 1970s EPROM Chaos in 2025
hackaday.comΒ·1d
πŸ–₯Retro Computing
SRE Weekly Issue #491
sreweekly.comΒ·4h
πŸ‘οΈSystem Observability
How Many Paths of Length K Are There Between a and B?
horace.ioΒ·9hΒ·
Discuss: Hacker News
πŸ•ΈοΈGraph Algorithms
Over-Engineering Sleep
matt.blwt.ioΒ·15h
🐚Bash FP
Weeknotes: 2025-W34
thomasrigby.comΒ·12h
🧬PostgreSQL Forensics
DocHop-QA: Towards Multi-Hop Reasoning over Multimodal Document Collections
arxiv.orgΒ·2h
πŸ“‡Dublin Core
TaMaRa: Towards a Triple Modular Redundancy Pass for Yosys
blog.yosyshq.comΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ”FPGA Verification
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.orgΒ·55mΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap