🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🗄️ Database Recovery

Corruption Analysis, B-tree Repair, Transaction Logs, Storage Archaeology

Double Maths First Thing: Issue 35
aperiodical.com·17h
⚙️Proof Engineering
A[I]s We Many Not Think (nor search, nor link)
cogdogblog.com·1d
🔍BitFunnel
Is the Microsoft Teams data export tool vaporware?
blog.zulip.com·8h·
Discuss: Hacker News
🦋Format Evolution
Can Your Team Pass the Elevator Test? (2007)
blog.codinghorror.com·14h·
Discuss: Hacker News
⚔️Lean Tactics
My review of Claude's new Code Interpreter, released under a very confusing name
simonwillison.net·1d·
Discuss: Hacker News, Hacker News
🌳Incremental Parsing
U.S. places $11 million bounty on Ukrainian ransomware mastermind — Tymoshchuk allegedly stole $18 billion from large companies over 3 years
tomshardware.com·6h
🔓Hacking
The exceptionalism of software is unwarranted
overbring.com·1d·
Discuss: Hacker News
📏Code Metrics
Billion-Line Days Demand Billion-Test Nights
momentic.ai·1d·
Discuss: Hacker News
📏Code Metrics
Anatomy of a Storage Drive: Hard Disk Drives
techspot.com·2d
🧲Magnetic Recording
Opendoor: Not Chasing The Rally, Not Shorting The Squeeze
seekingalpha.com·8h
🔍BitFunnel
Most Candidates Fail These SQL Concepts in Data Interviews
kdnuggets.com·5d
🧠Query Planners
Sui fobbed off my disclosure that nearly 40% of their validators are exposed
news.ycombinator.com·13h·
Discuss: Hacker News
🔓Hacking
chalk + debug just got owned on npm… and honestly, this is the nightmare I’ve been expecting
codeant.ai·1d·
Discuss: Hacker News, r/node, r/programming
❄️Nix Adoption
Autonomous Drone Swarm Localization via Multi-Modal Semantic Mapping and Reinforcement Learning
dev.to·1d·
Discuss: DEV
🏺Computational Archaeology
Beyond the Buzzword: How a Web App Development Company in Coimbatore Integrates AI for Smarter User Experiences
dev.to·13h·
Discuss: DEV
🤖AI Curation
Software dev isn’t life or death (but it sure feels like it)
dev.to·9h·
Discuss: DEV
🔩Systems Programming
Hijacking Windows Processes: A Step-By-Step Guide
infosecwriteups.com·1d
🛡️eBPF Security
Automated Bias Mitigation via Causal Graph Interventions and Hyperparameter Optimization
dev.to·18h·
Discuss: DEV
🎛️Feed Filtering
Automated Hierarchical Graph Construction for Multi-source Electronic Health Records
arxiv.org·1d
📄Document Digitization
Creating a cyber-first culture through strategic governance
techradar.com·14h
🛡Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap