๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ฆ CBOR Extensions

Binary Serialization, Schema Evolution, Protocol Security, Data Interchange

Local Privilege Escalation via chroot option
172.30.200.40ยท9h
๐Ÿ”“Hacking
Redid my network, who says you need a rack...
i.redd.itยท23hยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup
Parameterized Complexity of Directed Traveling Salesman Problem
arxiv.orgยท20h
๐ŸงฎKolmogorov Complexity
Introducing Batch Transactions on the XRP Ledger: More Opportunities, Less Friction
dev.toยท3dยท
Discuss: DEV
โšกHardware Transactional Memory
From Detection to Response: The Power of SOC Solutions
infosecwriteups.comยท2d
๐ŸšจIncident Response
Machine Learning Fundamentals: anomaly detection
dev.toยท3dยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
Ran out of idea for AI product, so I talked to Gemini
dev.toยท1dยท
Discuss: DEV
๐Ÿ›Digital humanities
Real Time Game Server Architecture Design Low Latency High Concurrency Technical Implementation๏ผˆ1751201311772400๏ผ‰
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ€Embedded Rust
CCRS: A Zero-Shot LLM-as-a-Judge Framework for Comprehensive RAG Evaluation
arxiv.orgยท4d
๐Ÿ“Linear Logic
AI-Powered Cybersecurity Systems: Attack Prediction Models
dev.toยท5hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Why We Chose Rust For Spin
dev.toยท3dยท
Discuss: DEV
๐Ÿฆ€Rust Macros
RAG vs Fine-tuning vs Prompt Engineering: The Complete Enterprise Guide
dev.toยท3dยท
Discuss: DEV
๐ŸŒŠStream Processing
Macros Explained for Java Developers
dev.toยท1dยท
Discuss: DEV
๐Ÿง Lisp Dialects
How DevOps Services Improve Software Delivery and Quality
devops.comยท14h
โ„๏ธNix Adoption
Adding Sessions and Memory to Your AI Agent with Agent Development Kit (ADK)
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Uncovering smooth structures in single-cell data with PCS-guided neighbor embeddings
arxiv.orgยท20h
๐ŸŒ€Hyperbolic Geometry
HarmonyOS Development: Understanding Application-Level Configuration Information
dev.toยท1dยท
Discuss: DEV
๐Ÿ“‹Format Specification
Letting the power of Agentic AI: How Autonomous Agents are transforming Cybersecurity and Application Security
dev.toยท16hยท
Discuss: DEV
๐Ÿ”’Language-based security
Boosting Kafka Throughput with Spring Kafka Batch Listener and Async Processing
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
ARMOR: Robust Reinforcement Learning-based Control for UAVs under Physical Attacks
arxiv.orgยท20h
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap