🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos History

Authentication Evolution, MIT Athena, Domain Architecture, Ticket Forensics

Rare Space Dust Reveals a Shocking Link Between Very Different Asteroids
scitechdaily.com·7h
🦴Database Paleontology
Computer Architecture Lessons from the Kitchen
sigarch.org·21h
🧮Algorithmic Cooking
Representative Line: Not What They Meant By Watching "AndOr"
thedailywtf.com·4h
🔗Concatenative Programming
The ABCs of “‑ishing”: From Phishing to Quishing
bitsight.com·4d
🎯Threat Hunting
AWS Machine Learning Engineer (Associate) Exam
bukola.info·2h·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Bmssp: A New Shortest Path Algorithm
rohanparanjpe.substack.com·16h·
Discuss: Substack
🔗Topological Sorting
Data I/O reports business disruptions in wake of ransomware attack
cyberscoop.com·19h
🚨Incident Response
Google wants Android app developers to verify their identity, this could affect sideloading apps
ghacks.net·5h
📜Proof Carrying Code
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
hackernoon.com·1d
🔄Archival Workflows
Membership at the restaurant reservation app Dorsia can cost $25,000. Its CEO will boot you for this mistake.
businessinsider.com·1h
🎫Kerberos Attacks
How Hackers Trick AI: The Hidden World of Prompt Injections and Jailbreaks
dev.to·2d·
Discuss: DEV
🔓Hacking
A Feminist Account of Intersectional Algorithmic Fairness
arxiv.org·7h
🌍Cultural Algorithms
Meta raids Google DeepMind and Scale AI for its all-star superintelligence team
businessinsider.com·2h
🤖AI Curation
A Defect Classification Framework for AI-Based Software Systems (AI-ODC)
arxiv.org·7h
👁️System Observability
Safe Is What We Call Things Later: Some Software Engineering Folklore
worksonmymachine.ai·1d·
Discuss: Hacker News
⚙️Proof Engineering
Analysis of Harpy's Constrained Trotting and Jumping Maneuver
arxiv.org·7h
🌀Differential Geometry
How to Benchmark Classical Machine Learning Workloads on Google Cloud
towardsdatascience.com·14h
⚡Performance Mythology
Ensuring Idempotency in Distributed Systems – Lessons from Go & GCP
dev.to·1d·
Discuss: DEV
🔄Reproducible Builds
Harnessing MCP Servers with LangChain and LangGraph: A Comprehensive Guide
dev.to·1d·
Discuss: DEV
🔗Constraint Handling
The Human-in-the-Loop Factor: Partnering With Amazon Q During a Production Incident
dev.to·2d·
Discuss: DEV
🛡️Error Boundaries
Loading...Loading more...
AboutBlogChangelogRoadmap