🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“Ό Cassette Networking

Sequential Protocols, Tape Communication, Linear Data Exchange, Historical Networking

A distributed systems reliability glossary
antithesis.comΒ·7hΒ·
Discuss: Lobsters, Hacker News, r/programming
βœ…Archive Fixity
MobiWorld: World Models for Mobile Wireless Network
arxiv.orgΒ·18h
πŸ•ΈοΈNetwork Topology
Pulling at Threads With the Flipper Zero
hackaday.comΒ·2h
πŸ“»Homebrew Protocols
Looking for Home Network Design Best Practices & Setup Templates
reddit.comΒ·17hΒ·
Discuss: r/homelab
🏠HomeLab
Ex-Dyson engineer to launch LTO tape holographic rival that uses cheap $5 laser diode, promises 200TB cartridges on 100m reels β€” but read/write speeds are unkno...
techradar.comΒ·4h
βš›οΈQuantum Tape
exploring NABU in 2025, a Canadian cable TV network from 1984
othernetworks.netΒ·1d
πŸ’Ύvintage computing
It’s Not What You Pay, It’s How Fast You Play: A History of MEV
hackernoon.comΒ·6h
πŸ–₯️Terminal Renaissance
Song recommendations with pipes and filters
blog.ploeh.dkΒ·1d
Ξ»Lambda Formalization
Federated instant messaging, 100% debianized
blog.trueelena.orgΒ·22h
πŸ”ŒInterface Evolution
With Tomahawk Ultra, Broadcom asks who needs UALink when there's Ethernet?
theregister.comΒ·9h
πŸ–₯️Modern Terminals
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.devΒ·13hΒ·
Discuss: Lobsters, Hacker News
🌐Network Protocols
An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance
securityaffairs.comΒ·21h
πŸ“»Homebrew Protocols
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgΒ·2d
🌐DNS Security
You Can Now Access sheep.horse With IPv6
sheep.horseΒ·10h
πŸ›£οΈBGP Hijacking
Inside The Box: Everything I Did with an Arduino Starter Kit
lopespm.comΒ·13hΒ·
Discuss: Hacker News
πŸ”ŒSingle Board PC
Re-implementing the Nix protocol in Rust
tweag.ioΒ·1dΒ·
Discuss: Hacker News
πŸ”’Linear Types
πŸ” Introducing EMCL – A Secure Protocol for AI Agents to Call Tools
dev.toΒ·6hΒ·
Discuss: DEV
🌐NetworkProtocols
How Criminal Networks Exploit Insider Vulnerabilities
darkreading.comΒ·8h
πŸ”“Hacking
The supply chain's last mile is complex and expensive. AI has the potential to fix its woes.
businessinsider.comΒ·4h
πŸ”—Supply Chain
Setting Up OpenTelemetry on the Frontend Because I Hate Myself
thenewstack.ioΒ·1d
πŸ‘οΈSystem Observability
Loading...Loading more...
AboutBlogChangelogRoadmap