🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📋 Format Specification

Binary Protocols, Schema Design, Interface Description, Standard Development

Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Design Systems: The True Source of Frontend Peace How Design Systems can save you
blog.codeminer42.com·11h
🎨Nordic Design
Applying SOLID Principles in Go
dev.to·5h·
Discuss: DEV
💧Liquid Types
Das Problem mit German Strings
polarsignals.com·8h·
Discuss: Lobsters, Hacker News
✅Format Verification
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·16h
✅Format Verification
The Compass Pattern: How smart documentation architecture saves $0.63M annually
wyrd-technology.com·16h·
Discuss: Hacker News
📚MARC Evolution
Claude Code's 19 cent Parser
blogger.com·1d
🔧Binary Parsers
Using panic metadata to recover source code information from Rust binaries | cxiao.net
cxiao.net·14h
🦀Rust Macros
Developer Spotlight: Drivers of Innovation – The Chowmain Way
blogs.qsc.com·9h
🔌Interface Evolution
The Hexagon: A Battle-Tested Blueprint for Your Event-Driven App
mina-tafreshi.medium.com·9h·
Discuss: Hacker News
🌊Streaming Systems
Guessing Game: Haskell Style
entropicthoughts.com·1d
👑Dependent Haskell
TypeScript Cookbook • Stefan Baumgartner & Peter Kröner
youtube.com·16h
🎯Gradual Typing
Event Catalog — Exploring The Advanced Capabili
medium.com·1d
🏷️Metadata Standards
The Nickel Configuration Language
nickel-lang.org·3d·
Discuss: Hacker News
💧Liquid Types
Securing FreeBSD Services with Lightweight Jails
discoverbsd.com·23h
🗄️File Systems
Encoding sortable binary database keys
stately.cloud·9h·
Discuss: Hacker News
💾Database Formats
A Model for all Ranges
qt.io·14h·
Discuss: Lobsters, Hacker News, r/programming
🧩SQLite Extensions
A Bitcoin Core Code Analysis
binaryigor.com·1d·
Discuss: Hacker News
🧬Bitstream Evolution
The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)
isc.sans.edu·2d
📡BGP Archaeology
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·1d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap