๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ฆ CBOR Extensions

Binary Serialization, Schema Evolution, Protocol Security, Data Interchange

Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comยท7h
๐Ÿ“‹Protocol Buffers
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.skยท6hยท
Discuss: Hacker News
๐ŸงฉWASM Modules
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toยท6hยท
Discuss: DEV
๐Ÿ”’WASM Capabilities
Encrypting identifiers in practice
sjoerdlangkemper.nlยท9h
๐ŸŒŠStream Ciphers
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comยท1d
๐ŸŒณArchive Merkle Trees
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
Maturing your smart contracts beyond private key risk
blog.trailofbits.comยท1d
๐Ÿ”Quantum Security
Program Execution, follow-up
windowsir.blogspot.comยท2hยท
Discuss: www.blogger.com
โšกPerformance Tools
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols๏ผˆ1750830996145900๏ผ‰
dev.toยท8hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Slashing CI Costs at Uber
uber.comยท4hยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
TableVault: Managing Dynamic Data Collections for LLM-Augmented Workflows
arxiv.orgยท1d
๐Ÿ”„Schema Evolution
LakeFS adds REST catalog support for data version control on structured data
lakefs.ioยท1hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Networking for Systems Administrators
mwl.ioยท1hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท7h
๐Ÿ›๏ธMainframe Archaeology
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukยท13h
๐Ÿ”Quantum Security
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท2h
๐Ÿฆ Malware Analysis
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toยท1hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
The Case for Native Iceberg Catalog APIs and Unified Governance in Object Storage
blog.min.ioยท1d
๐Ÿท๏ธMetadata Standards
Containers are available in public beta for simple, and programmable compute
blog.cloudflare.comยท22hยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท1d
๐Ÿ”ขBitwise Algorithms
Loading...Loading more...
AboutBlogChangelogRoadmap