🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“¦ CBOR Extensions

Binary Serialization, Schema Evolution, Protocol Security, Data Interchange

Cloud Storage Myths Debunked, Part Two: Storage Isn’t a Big Enough Problem to Remediate
backblaze.comΒ·22h
🏠Homelab Preservation
On The Little Things of Data Representation
lmika.orgΒ·5d
πŸ—„οΈDatabase Internals
Vulkan: Continuing to Forge Ahead
khronos.orgΒ·1dΒ·
Discuss: Hacker News
🎬WebCodecs
kamailio/kamailio
github.comΒ·13h
πŸ”“Open Source Software
A One-Class Explainable AI Framework for Identification of Non-Stationary Concurrent False Data Injections in Nuclear Reactor Signals
arxiv.orgΒ·1d
πŸ”Vector Forensics
Meet Kuba - Get rid of .env entirely
github.comΒ·15hΒ·
Discuss: Hacker News, r/webdev
πŸ“¦Container Security
Building a Privacy-First Document QA System with Gaia and Qdrant
dev.toΒ·2hΒ·
Discuss: DEV
πŸ€–Archive Automation
An Intrinsic Barrier for Resolving P = NP (2-SAT as Flat, 3-SAT as High-Dimensional Void-Rich)
arxiv.orgΒ·11h
🎯Performance Proofs
DORA: six months into a resilience revolution
techradar.comΒ·1d
🎯Threat Hunting
ORFuzz: Fuzzing the "Other Side" of LLM Safety -- Testing Over-Refusal
arxiv.orgΒ·2d
πŸ›Fuzzing
A2HCoder: An LLM-Driven Coding Agent for Hierarchical Algorithm-to-HDL Translation
arxiv.orgΒ·2d
πŸ’»Local LLMs
OWASP Top 10 CI/CD Security Risks & How to Fix Them
boostsecurity.ioΒ·1d
πŸ›‘οΈWebAssembly Security
Bringing AI to the Edge: MCP for IoT
dev.toΒ·1dΒ·
Discuss: DEV
🏠Home Automation
Struggling with Vendor Lock-In? Why PostgreSQL is Your Exit Strategy?
dev.toΒ·8hΒ·
Discuss: DEV
πŸ”„Schema Evolution
CURE: Critical-Token-Guided Re-concatenation for Entropy-collapse Prevention
arxiv.orgΒ·2d
πŸ”—Concatenative Programming
Aggressive Proximity Patterns: Teaching AI Agents to Write Production-Ready Code
dev.toΒ·1dΒ·
Discuss: DEV
⚑Proof Automation
The AI Risk Spectrum: From Dangerous Capabilities to Existential Threats
arxiv.orgΒ·11h
πŸ”²Cellular Automata
How to Capture OAuth Callbacks in CLI and Desktop Apps with Localhost Servers
hackernoon.comΒ·7h
⚑gRPC
The Challenge of Cybersecurity Frenemies and Collaboration
paloaltonetworks.comΒ·3h
🎯Threat Hunting
Building InboxHiiv: Event-Driven Podcast Processing with Firebase Functions and Gemini AI
dev.toΒ·1dΒ·
Discuss: DEV
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap