๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ก BGP Archaeology

Internet Routing History, Protocol Evolution, Network Topology, AS Relationships

Data Lakehouse Security: Supporting Scalable Analytics and AI Workloads
blog.min.ioยท18h
๐Ÿ“ฆMETS Containers
Intel founded July 18, 1968
dfarq.homeip.netยท6h
๐ŸงฒRISC-V Archaeology
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.comยท1d
๐ŸŒDNS Security
The Good, the Bad and the Ugly in Cybersecurity โ€“ Week 29
sentinelone.comยท4h
๐Ÿ”“Hacking
LiLM-RDB-SFC: Lightweight Language Model with Relational Database-Guided DRL for Optimized SFC Provisioning
arxiv.orgยท2d
๐ŸŒ€Brotli Internals
Show HN: Default-Exploitability Context for CISA Known Exploited Vulnerabilities
github.comยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ›ก๏ธCBOR Security
Information-Theoretic Aggregation of Ethical Attributes in Simulated-Command
arxiv.orgยท13h
๐Ÿ”ฒCellular Automata
Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
blog.cloudflare.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
From Corporate Grind to Home Server Grind: My Self-Hosting Adventure
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
Enterprise Bedrock Agent for Retail Customer Success
dev.toยท11hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
From Neural Network Frustration to Mathematical Innovation
dev.toยท8hยท
Discuss: DEV
๐Ÿง Machine Learning
OpenAI's ChatGPT Agent Outperforms the Model Alone: Impact for Developers
belitsoft.comยท5hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
Triggering QUIC
blog.apnic.netยท3d
๐ŸŒDNS over QUIC
Grappling with the Existential Panic over AI
easydns.comยท1dยท
Discuss: Hacker News
โšกProof Automation
Dollars per token considered harmful
modal.comยท2dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
How Standard Setters Run the Internet
internetsociety.orgยท3d
๐ŸŒWeb Standards
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.orgยท2d
๐ŸŽฏThreat Hunting
Which graph motif parameters count?
arxiv.orgยท1d
๐Ÿ”—Graph Isomorphism
TransEvalnia: Reasoning-based Evaluation and Ranking of Translations
arxiv.orgยท13h
โš™๏ธCompression Benchmarking
Antivirus vs Firewall: which is right for me?
techradar.comยท4h
๐Ÿ›ก๏ธeBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap