🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
△ Delta Compression

Version Control, Diff Algorithms, Incremental Backups, Change Tracking

Go at american express today
americanexpress.io·18h
🔌Interface Evolution
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.com·9h
🌐DNS Security
Developing with Kiro: Amazon's New Agentic IDE
yehudacohen.substack.com·2d·
Discuss: Substack
❄️Nix Adoption
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.to·20h·
Discuss: DEV
📡Network Monitoring
Wrote a blog about using Dapr and mirrord together
metalbear.co·5h
📦Container Security
Building enterprise-scale RAG applications with Amazon S3 Vectors and DeepSeek R1 on Amazon SageMaker AI
aws.amazon.com·4h
🔌Archive APIs
Machine Learning Fundamentals: dimensionality reduction example
dev.to·1d·
Discuss: DEV
📐Vector Dimensionality
Stop Fighting Image Formats: A Developer's Guide to Streamlined Image Processing
dev.to·1d·
Discuss: DEV
📸PNG Optimization
Solving the Context Rot Problem for Coding Agents
install.md·21h·
Discuss: Hacker News
🌳Incremental Parsing
Self-hosting CI runners is a trap
shipfox.io·3h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Ilion Framework: A Public Layer for Semantic Alignment with Truth
zenodo.org·4d·
Discuss: Hacker News
💾Binary Linguistics
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.org·13h
🔐Quantum Security
A PhD's Apology
cappadokes.github.io·1d·
Discuss: Hacker News
🧮Theoretical Computer Science
Automated Function ID Database Generation in Ghidra on Windows
blog.mantrainfosec.com·5h·
Discuss: Hacker News
🔓Decompilation
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.org·13h
⧗Information Bottleneck
Vibe Coding with AI: Ensuring User Needs Are Met
kamil.chm.ski·3h·
Discuss: Hacker News
🚀Indie Hacking
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·1d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Compressed data structures for Heegaard splittings
arxiv.org·1d
🕳️Persistent Homology
Nextflow: System for creating scalable, portable, reproducible workflows
github.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Algorithm Design and Comparative Test of Natural Gradient Gaussian Approximation Filter
arxiv.org·13h
🌀Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap