🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤝 Consensus Algorithms

Byzantine Fault Tolerance, Distributed Agreement, Blockchain Fundamentals, Network Reliability

We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.com·1d
🔗Hash Chains
Rethinking Distributed Computing for the AI Era
cacm.acm.org·2h
⚡Incremental Computation
A distributed systems reliability glossary
antithesis.com·1d·
Discuss: Lobsters, Hacker News, r/programming
✅Archive Fixity
Jaya Klara Brekke: ‘Know who runs your infrastructure’
blog.okfn.org·48m
🌐Network Security
Project SERVFAIL: one year in
sdomi.pl·30m
📡BGP Archaeology
Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
hackernoon.com·1d
🔗Hash Chains
Temperature and Persona Shape LLM Agent Consensus With Minimal Accuracy Gains in Qualitative Coding
arxiv.org·17h
🤝Consensus Networks
Checking data integrity
eclecticlight.co·14h
✅Checksum Validation
An engineer’s path from data loss to software preservation
softwareheritage.org·19h
🔄Archival Workflows
How Amazon Bedrock CMI Cut AI Model Onboarding Time by 75%
engineering.salesforce.com·1d
🔄Sync Engine
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.il·23h·
Discuss: Hacker News
🎯Interactive Provers
Parsing Protobuf Like Never Before
mcyoung.xyz·14h
🔧Binary Parsers
Async BOFs – “Wake Me Up, Before You Go Go”
outflank.nl·9h
🔍eBPF
AWS announced support for clusters with up to 100k nodes
aws.amazon.com·20h·
Discuss: Hacker News
🏠Homelab Federation
Introducing Check Point Quantum Spark 2500: Smarter Security, Faster Connectivity, and Simpler MSP Management
blog.checkpoint.com·6h
📊Homelab Monitoring
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.to·6h·
Discuss: DEV
🌀Brotli Internals
Reactive Java Operator-fusion (2016)
akarnokd.blogspot.com·2h·
Discuss: Hacker News
✨Algebraic Effects
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·7h
📡Bluetooth Archaeology
New research connects quantum computing power to the security of cryptographic systems
phys.org·1d
🔐Quantum Security
Fastly’s Edge Network: Building for Availability
fastly.com·21h
🕸️Mesh Networking
Loading...Loading more...
AboutBlogChangelogRoadmap