🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“ Delta Encoding

Version Control, Incremental Backups, Compression Efficiency, Change Tracking

Floating-Point Data Transformation for Lossless Compression
arxiv.orgΒ·1d
🌊Streaming Compression
Introducing Qodo Gen CLI: Build and Run Agents Anywhere in the SDLC
qodo.aiΒ·5hΒ·
Discuss: Hacker News
πŸ”„Language Evolution
How to Migrate a Large Proxmox Virtual Machine to another Host
homeserverguides.comΒ·3hΒ·
Discuss: r/homelab
πŸ’ΎProxmox Storage
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·21hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Kafka Fundamentals: kafka retention.ms
dev.toΒ·7hΒ·
Discuss: DEV
🌊Streaming Systems
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comΒ·11h
πŸ“‹Protocol Buffers
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·11h
πŸ›οΈMainframe Archaeology
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·13h
🌊Stream Ciphers
Slashing CI Costs at Uber
uber.comΒ·8hΒ·
Discuss: Hacker News
πŸ”„Reproducible Builds
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.comΒ·1h
πŸ’ΏZFS Internals
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comΒ·9h
πŸ”“Hacking
See More, Worry Less: Managed Database Observability, Monitoring, and Hardening Advancements
digitalocean.comΒ·1d
πŸ“ŠHomelab Monitoring
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chΒ·9h
πŸ—ƒοΈDatabase Storage
Show HN: Blockdiff – How we built our own file format for VM disk snapshots
cognition.aiΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ’ΏZFS Internals
Program Execution, follow-up
windowsir.blogspot.comΒ·5hΒ·
Discuss: www.blogger.com
⚑Performance Tools
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·11h
πŸ“Concrete Syntax
The collective waste caused by poor documentation
shanrauf.comΒ·16hΒ·
Discuss: Hacker News
πŸ“¦Deflate
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comΒ·3hΒ·
Discuss: Hacker News
πŸ“‹DFDL
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·6h
🦠Malware Analysis
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comΒ·1d
🌳Archive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap