🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📋 Protocol Buffers

Schema Evolution, Binary Serialization, gRPC, Message Formats

Nathan Lents’s New Book Explores How Animal Behavior and Evolution Challenge Binary Sex and Gender Norms
scientificamerican.com·4d
🧬Bitstream Evolution
AI Agentic Programming: A Survey of Techniques, Challenges, and Opportunities
blog.raymond.burkholder.net·6d
⚡Incremental Computation
Colt Technical Services gets ransomware’d via SharePoint initial access— some learning points
doublepulsar.com·2d
🔒Secure Boot
"Things are a bit bumpy right now" – FreeBSD:15 pkg repo is essentially down
lists.freebsd.org·5d·
Discuss: Hacker News
❄️Nix Flakes
3D Layered Text: Interactivity and Dynamism
css-tricks.com·2d
📟Terminal Physics
Working With JSON Data in Python
realpython.com·4d
✅Format Verification
Product shouldn't decide what to build
willmartian.com·2d·
Discuss: Hacker News
🔗Dependency Resolution
One year later, the Rabbit R1 is good now
tomsguide.com·1d·
Discuss: Hacker News
🎯Emulator Accuracy
Ask HN: Solar+WiFi IP Security Cameras?
news.ycombinator.com·1d·
Discuss: Hacker News
🎬Video Codecs
Lucky user finds 6TB of free SSD storage while dumpster diving — finder plans to use the six 1TB Samsung 850 Pro SSDs to download entire Steam library
tomshardware.com·1d
🎮Cartridge Archaeology
AMD VitisT Al Integrated Development Environment
github.com·1d·
Discuss: Hacker News
🔓Open Source Software
Honey, I shrunk the image and now I'm pwned
theregister.com·3d
🎫Kerberos Attacks
How SocialFi Crowdfunding is Replacing VCs in Crypto: Interview with SeedList Co-Founder
hackernoon.com·3d
🚀Indie Hacking
CURE: Critical-Token-Guided Re-concatenation for Entropy-collapse Prevention
arxiv.org·6d
🔗Concatenative Programming
Characterizing Community Formation in Response to Extreme Weather Events through Human Mobility Networks
arxiv.org·4d
🕸️Mesh Networking
Sorry, Baby to Earl Sweatshirt: the week in rave reviews
theguardian.com·1d
⭐Awesome lists
Exploit weaponizes SAP NetWeaver bugs for full system compromise
securityaffairs.com·4d
🔓Hacking
CausalPlan: Empowering Efficient LLM Multi-Agent Collaboration Through Causality-Driven Planning
arxiv.org·4d
⚙️TLA+
OpenJDK, Temurin, GraalVM... Which Java JDK Should You Actually Install in 2025?
dev.to·4d·
Discuss: DEV
🔄Reproducible Builds
The Next Graphics Revolution Is Not What You Think
dev.to·1d·
Discuss: DEV
🖥️Terminal Renaissance
Loading...Loading more...
AboutBlogChangelogRoadmap