🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🐚 Bash Combinators

Shell Scripting, Function Composition, Pipeline Design, Unix Philosophy

Watch the on-demand webinar: Shift left without the strain
portswigger.net·8h
👁️System Observability
CachyOS July 2025 Update Brings Shell Choice, Wayland Defaults
linuxiac.com·1d
🕸️WASM Archives
Flakes aren't real and cannot hurt you: a guide to using Nix flakes the non-flake way - jade's www site
jade.fyi·3d
❄️Nixpkgs
Show HN: legacy-use – add REST APIs to legacy software with computer-use
legacy-use.com·15h·
Discuss: Hacker News
🔌Archive APIs
Did early Unix shells ever use `chd` command to change directories?
news.ycombinator.com·16h·
Discuss: Hacker News
🕰Unix history
Tuist Server is now Source Available
tuist.dev·5h·
Discuss: Hacker News
🔓Open Source Software
End-to-End ELK + MCP Integration: A Beginner’s Deployment Guide
infosecwriteups.com·10h
🏠HomeLab
What the LLM Hype Gets Wrong: What it Takes to Build AI Agents That Work for Enterprises
devops.com·10h
⚙️TLA+
Ramanujan-Computing: Distributed Computing with Idle Smart Devices: Open-Source
news.ycombinator.com·1d·
Discuss: Hacker News
🧮Z3 Applications
Help validate a new open-source prototyping platform!
reddit.com·1d·
Discuss: r/homelab
🎮Switch Archaeology
Remnants: Chapter 1 - Swarm
hackernoon.com·16h
💻Local first
Why AI Agent Implementations Keep Failing (and the Patterns That Work)
davidlambauer.de·10h·
Discuss: Hacker News
⚡Proof Automation
Sysbox Container Runtime
github.com·7h·
Discuss: Hacker News
📦Container Security
A Practical Two-Stage Recipe for Mathematical LLMs: Maximizing Accuracy with SFT and Efficiency with Reinforcement Learning
arxiv.org·17h
💻Local LLMs
"Amazing, They All Lean Left" -- Analyzing the Political Temperaments of Current LLMs
arxiv.org·17h
🧲Magnetic Philosophy
How much attention do you need, really? Experiments in O(1) task completion
notion.so·1d·
Discuss: Hacker News
🌀Brotli Internals
Representing Guardedness in Call-by-Value and Guarded Parametrized Monads
arxiv.org·6d
🧮Algebraic Archives
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.com·11h
🎫Kerberos Exploitation
The Color Doesn't Matter
tristanpemble.com·21h·
Discuss: Hacker News
⚡Dependent Rust
Inferencing LLMs in production with Kubernetes and KubeFlow - Chamod Perera & Suresh Peiris
youtube.com·1h
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap