Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💾 Persistence Strategies
Durability, Crash Recovery, Journal Design, Checkpoint Systems
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19372
posts in
156.6
ms
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
20h
📝
Database WAL
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
5h
·
Discuss:
Hacker News
🔐
Archive Encryption
Performance Tip of the Week #62:
Identifying
and reducing memory
bandwidth
needs
abseil.io
·
12h
💨
Cache Analysis
Production pain points and coordination patterns from building a
dual-orchestrator
(Claude + Kimi) system on Claude Code. 8 failure modes with specs and
invariants
.
gist.github.com
·
11h
·
Discuss:
Hacker News
✨
Effect Handlers
How businesses can
unlock
the true value of modern
log
management
techradar.com
·
1d
📝
Log Parsing
Anatomy
of a
5-Layer
Defence Pipeline for AI Agent Memory
dev.to
·
15h
·
Discuss:
DEV
🌳
Archive Merkle Trees
Joy
&
Curiosity
#73
registerspill.thorstenball.com
·
3h
🌀
Brotli Internals
OSTEP
Chapters
6,7
muratbuffalo.blogspot.com
·
2d
·
Discuss:
Blogger
⚡
CPU Microarchitecture
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
10h
🔓
Hacking
Durable
Execution: Build reliable software in an
unreliable
world
thenewstack.io
·
5d
·
Discuss:
Hacker News
🛡️
Error Boundaries
Explainer
:
XPC
eclecticlight.co
·
1d
🔐
CBOR
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Circumstantial
Complexity
, LLMs and Large Scale Architecture
datagubbe.se
·
5h
·
Discuss:
Hacker News
⚙️
Proof Engineering
How One System
Feeds
Everything I Do: From
Scattered
Chaos to Unified Creation
dsebastien.net
·
1d
🌱
Personal Wikis
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
·
2d
⚙️
Operating System Design
CIPS
Stack – 5 memory systems that give your AI agents
persistent
memory
cipscorps.io
·
3d
·
Discuss:
Hacker News
💾
Persistent Memory
The
Sandbox
Explosion
daax.dev
·
1d
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
On
variability
surfingcomplexity.blog
·
13h
⚡
Incremental Computation
Efficiency
and Performance
dev.to
·
20h
·
Discuss:
DEV
🔩
Systems Programming
The 10-Layer Monitoring Framework That Saved Our
Clients
From 3 a.m.
Pages
devops.com
·
2d
👁️
Observatory Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help