🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🀝 Paxos Consensus

Distributed Agreement, Byzantine Failures, Consensus Protocols, State Machines

How do you deal with Kubernetes+Ceph+UPS and then WakeOnLan
reddit.comΒ·1hΒ·
Discuss: r/homelab
🏠HomeLab
Problem-solving is fundamental to human nature
freethink.comΒ·37m
πŸ”²Cellular Automata
Tailnet Lock is generally available
tailscale.comΒ·1d
πŸ”—Hash Chains
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comΒ·1d
🌳Archive Merkle Trees
Worth Reading 062425
rule11.techΒ·3h
🌐DNS over QUIC
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·9h
🎫Kerberos Attacks
Fixes for five Lix CVEs
lix.systemsΒ·1dΒ·
Discuss: Lobsters
❄️Nix Adoption
Signal Use and Emergent Cooperation
arxiv.orgΒ·14h
πŸ”²Cellular Automata
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·16hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Fault Tolerant Llama training – PyTorch blog
pytorch.orgΒ·2dΒ·
Discuss: Hacker News
πŸ›‘οΈByzantine Fault Tolerance
A Contention-Free Model for Converged Kubernetes on HPC
arxiv.orgΒ·1d
🏠Homelab Clusters
Building a Go Concurrency Task Scheduler: Efficient Task Processing Unleashed
dev.toΒ·17hΒ·
Discuss: DEV
🌊Stream Processing
C++ Seeding Surprises (2015)
pcg-random.orgΒ·2hΒ·
Discuss: Hacker News
πŸ”’Bitwise Algorithms
Slashing CI Costs at Uber
uber.comΒ·8hΒ·
Discuss: Hacker News
πŸ”„Reproducible Builds
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteΒ·23hΒ·
Discuss: Hacker News
🧲RISC-V Archaeology
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”Quantum Security
Design high-confidence computers using trusted instructional set architecture and emulators
arxiv.orgΒ·1d
πŸ§ͺHardware Fuzzing
Amazon Bedrock Agents observability using Arize AI
aws.amazon.comΒ·20h
πŸ€–Network Automation
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·1d
πŸ”’Bitwise Algorithms
Second Order State Hallucinations for Adversarial Attack Mitigation in Formation Control of Multi-Agent Systems
arxiv.orgΒ·1d
πŸ•ΈοΈTensor Networks
Loading...Loading more...
AboutBlogChangelogRoadmap