Feeds to Scour
SubscribedAll
Scoured 9563 posts in 3.57 s
What I Learned Building a Storage Engine That Outperforms RocksDB
tidesdb.comยท2hยท
๐Ÿฆ€Rusty Databases
Preview
Report Post
Looking for a Bulletproof Photo Backup Strategy (Unraid โ†’ Unraid? 3โ€‘2โ€‘1 Rule?)
reddit.comยท19hยท
Discuss: r/homelab
๐Ÿ’ฟBackup Strategies
Preview
Report Post
Introducing Pkl, a programming language for configuration
pkl-lang.orgยท5h
๐Ÿ’งLiquid Types
Preview
Report Post
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.toยท17hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Horton persistence progress
terracrypt.netยท12h
๐Ÿฆ€Rust Macros
Preview
Report Post
Tangible Media: A Historical Collection of Information Storage Technology
tangiblemediacollection.comยท16hยท
Discuss: Hacker News
๐ŸบMedia Archaeology
Preview
Report Post
10 storage technologies that want to replace hard drives
techradar.com
ยท10h
๐ŸŒˆHolographic Archives
Preview
Report Post
From Zero to QED: An informal introduction to formality in Lean 4
sdiehl.github.ioยท1d
๐Ÿ”ฌLean
Preview
Report Post
My First Step into Security: Building a Zero-Knowledge Vault
blog.thnkandgrow.comยท1d
๐Ÿ”Archive Encryption
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioยท8hยท
Discuss: DEV
๐Ÿ”Capability Systems
Preview
Report Post
A Validated Semantics for LLVM IR
sf.snu.ac.krยท12h
โœ…Formal Methods
Preview
Report Post
USB3: why it's a bit harder than USB2
web.archive.orgยท1d
โš™๏ธCassette Mechanics
Preview
Report Post
Department of Computer Science and Technology โ€“ Technical reports: UCAM-CL-TR-949
cl.cam.ac.ukยท2hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Preview
Report Post
Use Providable to check file histories
eclecticlight.coยท1d
๐Ÿ”—Data Provenance
Preview
Report Post
Transaction Management: Making ACID Real
dev.toยท6hยท
Discuss: DEV
๐Ÿ“Database WAL
Preview
Report Post
Examining the IconCache database
thinkdfir.comยท37m
๐Ÿ”Binary Forensics
Preview
Report Post
From Intent to Proof: Dafny Verification for Web Apps
midspiral.comยท1dยท
๐Ÿ›๏ธAgda
Preview
Report Post
Cybersecurity Snapshot: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics
tenable.comยท1d
๐Ÿ’พPersistence Strategies
Preview
Report Post
LangChain core vulnerability allows prompt injection and data exposure
securityaffairs.comยท6h
๐ŸŒDNS Security
Preview
Report Post