🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Byzantine Fault Tolerance

Distributed Archive Consensus, PBFT, Network Reliability, Preservation Protocols

FoundationDB: A Distributed Database That Can’t Be Killed
thenewstack.io·19h
🗄️Database Sharding
Implementing Merkle Trees in Go
vaktibabat.github.io·1d
🌳Archive Merkle Trees
What if Left-Right and Seq-Lock had a baby?
github.com·3h·
Discuss: Hacker News
🔒Type Safety
From Data Swamps to Reliable Data Systems: How Iceberg Brought 40 Years of Database Wisdom to Data Lakes
blog.min.io·17h
🏺Database Archaeology
P Verified
b-hilprecht.github.io·3d·
Discuss: Lobsters, Hacker News, r/programming
🤝Distributed Consensus
The Java Programming Language: A Silent Powerhouse
discoverbsd.com·1d
🔌Operating system internals
Serializable Isolation for Snapshot Databases
muratbuffalo.blogspot.com·2d·
Discuss: www.blogger.com
🔀CRDT
About the Cryptopocalypse
ritter.vg·1d
🌳Archive Merkle Trees
It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols
cacm.acm.org·2d
🌐NetworkProtocols
Argo CD: A Cornerstone in the GitOps Revolution for Kubernetes
dev.to·11h·
Discuss: DEV
🏠Homelab Orchestration
Post-quantum TLS in Python
aws.amazon.com·1d
🔐Quantum Security
Building Modern Software at Scale: Architectural Principles • Randy Shoup & Charles Humble
youtube.com·20h
🔌Interface Evolution
Immutable Backups: Everything You Need To Know To Protect Your Cloud
hackernoon.com·1d
💿Backup Strategies
This month at Tailscale: Tailnet Lock, Control plane IP changes, and headless Windows runners
tailscale.com·20h
🔗Tailscale
LMDB (Lightning Memory-Mapped Database)
en.wikipedia.org·1d·
Discuss: Hacker News
📝Database WAL
Data-Driven Incremental GAS Certificate of Nonlinear Homogeneous Networks: A Formal Modular Approach
arxiv.org·1d
🎯Performance Proofs
Observability 2.0: Much more than the Three Pillars
devops.com·1d
👁️System Observability
Radicle Collaborative Objects
radicle.xyz·2d
📦Content Addressing
Exploiting the Overlooked: From Regex Bypasses to Full Source Code Leaks
infosecwriteups.com·1d
💣ZIP Vulnerabilities
From Kernel to Cloud: Open Source Takes On Security Trade-Offs
linuxinsider.com·2d
📦Container Security
Loading...Loading more...
AboutBlogChangelogRoadmap