🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Capability Systems

Object Capabilities, Access Control, Security Models, seL4

A deep dive into deeply recursive Go
mattermost.com·4h·
Discuss: Hacker News
⬆️Lambda Lifting
Do Not Give Imperfect People Perfect Systems
loganmarek.com·10h·
Discuss: Hacker News
🔐Systems Hardening
I made a site that ranks products according to Reddit. Sharing how it works
redditrecs.com·1d·
Discuss: Hacker News
🔍Information Retrieval
Preventing Reentrancy Bugs From Creeping Back In: Linking TLA+ Models to Rust Code
medium.com·3d·
Discuss: Lobsters
🏛️Agda
You Shall Not Pass: Fine Grained Access Control with Row Level Security
cockroachlabs.com·2d·
Discuss: Hacker News, r/programming
🔤EBCDIC Privacy
Monitoring My Homelab, Simply
b.tuxes.uk·1d·
Discuss: Lobsters, Hacker News
📊Homelab Monitoring
SSPL is BAD
ssplisbad.com·2h·
Discuss: Hacker News
🔓Open Source Software
Talking Postgres with Shireesh Thota, Microsoft CVP
talkingpostgres.com·2h·
Discuss: Hacker News
🔌Interface Evolution
Programming Affordances That Invite Mistakes
thetechenabler.substack.com·1d·
Discuss: Substack
🔄Language Evolution
How to architect a scalable data pipeline for HealthTech applications
datasciencecentral.com·2d
🌊Stream Processing
When AI Has Root: Lessons from the Supabase MCP Data Leak
pomerium.com·4d·
Discuss: Hacker News
🔓Hacking
Stop Wrestling with AI Prompts: Build UI Components Visually and Generate Perfect Prompts
dev.to·1h·
Discuss: DEV
📟CLI Design
[Boost]
dev.to·17h·
Discuss: DEV
📄Document Digitization
FLoRA: An Advanced AI-Powered Engine to Facilitate Hybrid Human-AI Regulated Learning
arxiv.org·18h
🔲Cellular Automata
Uphold ethical standards in fashion using multimodal toxicity detection with Amazon Bedrock Guardrails
aws.amazon.com·6h
✅FLAC Verification
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
dev.to·2d·
Discuss: DEV
⚡gRPC
Kubrick, the Video Processing Agent
github.com·1d·
Discuss: Hacker News
🎧Learned Audio
Feint and Attack: Attention-Based Strategies for Jailbreaking and Protecting LLMs
arxiv.org·2d
🎯Threat Hunting
On Grok and the Weight of Design
hackernoon.com·1d
🌀Brotli Internals
Measuring the Impact of AI on Experienced Open-Source Developer Productivity
metr.org·1d·
Discuss: Lobsters, Hacker News, r/programming
⚡Performance Mythology
Loading...Loading more...
AboutBlogChangelogRoadmap