๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โšก Cache Coherence

Multicore Systems, MESI Protocol, Memory Consistency, Parallel Computing

Firmware Vulnerabilities Continue to Plague Supply Chain
darkreading.comยท1d
๐Ÿ”’Secure Boot
On This Day in Math - July 20
pballew.blogspot.comยท3hยท
Discuss: www.blogger.com
๐Ÿ‡ฌ๐Ÿ‡งBritish Computing
ZFS Summer Article Roundup: Smart Hardware Advice
klarasystems.comยท3d
๐Ÿ’ฟZFS Internals
The AGI Final Frontier: The CLJ-AGI Benchmark
raspasov.posthaven.comยท7hยท
Discuss: Hacker News
๐Ÿ›๏ธAgda
Reversing a Fingerprint Reader Protocol (2021)
blog.th0m.asยท10hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Say No to Gnulib
rgbcu.beยท11hยท
Discuss: Hacker News
โ„๏ธNixpkgs
Itโ€™s Not What You Pay, Itโ€™s How Fast You Play: A History of MEV
hackernoon.comยท4d
๐Ÿ–ฅ๏ธTerminal Renaissance
Assembling a Retro Chip Tester Pro
celso.ioยท1dยท
Discuss: Hacker News
โšกCircuit Archaeology
How to write Rust in the Linux kernel: part 3
lwn.netยท1dยท
Discuss: Hacker News, r/programming
๐Ÿฆ€Rust Borrowing
Why pull-based pipelines are faster
blog.sequinstream.comยท2dยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸŒŠStream Processing
MirageLSD: The First Live-Stream Diffusion AI Video Model
about.decart.aiยท2dยท
Discuss: Hacker News
โšกLZ4 Streaming
From Reactive to Predictive: Forecasting Network Congestion with Machine Learning and INT
towardsdatascience.comยท1d
๐Ÿ“กNetwork Monitoring
Using leaked data to examine vulnerabilities in SMS routing and SS7 signalling
medium.comยท17hยท
Discuss: Lobsters, Hacker News
๐ŸŒDNS Security
Agent Memory with Spring AI & Redis
dev.toยท3dยท
Discuss: DEV
โšกRedis Internals
Hyperpb: 10x faster dynamic Protobuf parsing in Go
buf.buildยท2dยท
Discuss: Hacker News
๐Ÿ“‹Protocol Buffers
Database Sharding: Slicing the Data Pizza for Scalability day 7 of learning system design
dev.toยท1dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Sharding
Machine Learning Fundamentals: ensemble learning example
dev.toยท15hยท
Discuss: DEV
๐ŸŒŠStream Processing
Last Week on My Mac: A strategy for data integrity
eclecticlight.coยท1h
โœ…Archive Fixity
Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5
synacktiv.comยท3dยท
Discuss: Lobsters, Hacker News
๐Ÿ”’Hardware Attestation
JavaScript Microtasks: A Comprehensive Guide the Event Loop
codedynasty.devยท3dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Loading...Loading more...
AboutBlogChangelogRoadmap