Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💾 Persistence Strategies
Durability, Crash Recovery, Journal Design, Checkpoint Systems
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19067
posts in
225.4
ms
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
1d
📝
Database WAL
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
19h
·
Discuss:
Hacker News
🔐
Archive Encryption
Performance Tip of the Week #62:
Identifying
and reducing memory
bandwidth
needs
abseil.io
·
1d
💨
Cache Analysis
Production pain points and coordination patterns from building a
dual-orchestrator
(Claude + Kimi) system on Claude Code. 8 failure modes with specs and
invariants
.
gist.github.com
·
1d
·
Discuss:
Hacker News
✨
Effect Handlers
How businesses can
unlock
the true value of modern
log
management
techradar.com
·
1d
📝
Log Parsing
Soft
Delete
Is a
Workaround
docs.eventsourcingdb.io
·
3h
·
Discuss:
Hacker News
⛏️
SQL Archaeology
My
Workflow
for
Agentic
Coding
szymonkrajewski.pl
·
9m
⚔️
Lean Tactics
Auto Memory, Auto
Forget
dev.to
·
12h
·
Discuss:
DEV
💾
Persistent Memory
The different
types
of
SSDs
in your computer
lowendmac.com
·
2h
🔌
Operating system internals
8)
linuxiac.com
·
3h
🔌
Operating system internals
GoodluckH/hibernate
: Permanently store what makes you who you are for reconstruction
github.com
·
3h
·
Discuss:
Hacker News
⏰
Time Crystals
OSTEP
Chapters
6,7
muratbuffalo.blogspot.com
·
3d
·
Discuss:
Blogger
⚡
CPU Microarchitecture
Evolving
our real-time
timeseries
storage again: Built in Rust for performance at scale
datadoghq.com
·
6h
🦀
Rusty Databases
Joy
&
Curiosity
#73
registerspill.thorstenball.com
·
17h
🌀
Brotli Internals
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
1h
·
Discuss:
Hacker News
🌐
IPFS
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
1d
🔓
Hacking
Durable
Execution: Build reliable software in an
unreliable
world
thenewstack.io
·
6d
·
Discuss:
Hacker News
🛡️
Error Boundaries
★ Claude Code: /
insights
perrotta.dev
·
9h
⚡
Proof Automation
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
2d
🔍
NTLM Forensics
Lazy-pulling containers: 65x faster pulls, but 20x
slower
readiness
blog.zmalik.dev
·
6h
·
Discuss:
Hacker News
📦
Container Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help