๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“‹ Format Specification

Binary Protocols, Schema Design, Interface Description, Standard Development

Thinking in Hoses and Wires, Not Bolted Gears (Protocol-Driven Development)
github.comยท9hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Part 7: Interacting with ERC-721 NFTs using `web3.py`
dev.toยท4hยท
Discuss: DEV
๐Ÿ“ABNF Extensions
Talk Highlights: Documenting the Design of the Linux Kernel โ€“ Chuck Wolber, The Boeing Company; Kate Stewart, The Linux Foundaiton; Gabriele Paoloni, Red Hat
elisa.techยท16h
๐Ÿ“œProof Carrying Code
Unicode and endianness
sjoerdlangkemper.nlยท18h
๐Ÿ”คCharacter Encoding
DNS at IETF 123
potaroo.netยท1d
๐ŸŒDNS Security
Consistency over Availability: How rqlite Handles the CAP theorem
philipotoole.comยท7hยท
Discuss: Hacker News
๐Ÿ›ก๏ธByzantine Fault Tolerance
Delimitation of modules in a modular monolithic architecture
reddit.comยท2hยท
Discuss: r/golang
๐ŸŒณGit Internals
An easy-to-implement, arena-friendly hash map
nullprogram.comยท2hยท
Discuss: Lobsters
๐Ÿ”Hash Functions
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท1d
โœ…Archive Validation
New NVMe specifications for AI, cloud, enterprise and client applications
heise.deยท1d
๐Ÿ’พPersistent Memory
The Amaranth hardware description language
amaranth-lang.orgยท20hยท
Discuss: Hacker News
๐Ÿ”FPGA Verification
Towards a Modern Web Stack
docs.google.comยท7hยท
Discuss: Hacker News
๐ŸŒWeb Standards
Analysing Snapshot Isolation
muratbuffalo.blogspot.comยท1dยท
Discuss: www.blogger.com
๐ŸŒณPersistent Data Structures
External Network Penetration Testing and Best Practices
hackerone.comยท7h
๐Ÿ•ต๏ธPenetration Testing
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.orgยท1d
๐Ÿ”“Open Source Software
Birthday Wishes Display
hackster.ioยท16h
โš™๏ธDIY Electronics
Decent Patterns
decentpatterns.comยท1d
๐ŸคDistributed Consensus
Ethernet Overload
blogger.comยท1h
๐Ÿ”ŒOperating system internals
Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
arxiv.orgยท19h
๐ŸŒธBloom Variants
Using Closures to Extend Class Behavior Without Breaking Encapsulation
hackernoon.comยท1d
๐Ÿ”ฌRefinement Types
Loading...Loading more...
AboutBlogChangelogRoadmap