๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Supply Chain

Build Verification, Reproducible Systems, Dependency Analysis, Software Provenance

Solving Data Consistency in Distributed Systems with the Transactional Outbox
blog.scottlogic.comยท1d
๐Ÿ”CBOR
Beyond Code: How to Use AI to Modernize Software Architecture
dev.toยท6hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Observability for Databases in CI/CD
blog.sonichigo.comยท22hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Deconstructing Trust
systemsapproach.orgยท1d
๐ŸŒณArchive Merkle Trees
Detection Engineering: Practicing Detection-as-Code โ€“ Versioning โ€“ Part 5
blog.nviso.euยท24m
โœ…Archive Validation
Major NPM Supply-Chain Attack: Potential Impact on Mobile Applications
nowsecure.comยท11h
๐Ÿ“ฆPackage Managers
Your Kubernetes: Strategic Asset or Ticking Time Bomb?
exoscale.comยท1d
๐Ÿ’พPersistence Strategies
Scaling the system that powers over $700M ARR invoices
medium.comยท8hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Continual learning with the Marketplace algorithm: model learns new data through inference, not training
fangpenlin.comยท1h
๐Ÿ“ŠLearned Metrics
A Secure Sequencer and Data Availability Committee for Rollups (Extended Version)
arxiv.orgยท4h
๐ŸŒณArchive Merkle Trees
Tony Hoare: How did software get so reliable without proof?
blog.regehr.orgยท11hยท
Discuss: Hacker News
โš™๏ธProof Engineering
Easy to use server for the KiCad Plugin and Content Manager
github.comยท23mยท
Discuss: Hacker News
๐Ÿ“ฆMETS Containers
Orchestrate multiple AI agents with cagent by Docker to create coding assistant
tobiasfenster.ioยท7hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
How to Set Up Custom Domains for Your Customers (The Right Way)
vanitycert.comยท3hยท
Discuss: Hacker News
๐ŸŒDNS Security
Software packages with more than 2 billion weekly downloads hit in supply-chain attack
arstechnica.comยท7hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Rust's Enterprise Breakthrough Year
rust-trends.comยท38mยท
Discuss: Hacker News
๐Ÿฆ€Embedded Rust
Building Sustainable Enterprise AI Adoption: Cultural Strategies That Achieved 95% Developer Engagement
engineering.salesforce.comยท17h
๐Ÿ”„Language Evolution
Predictive Maintenance in Semiconductor Fabrication via Multi-Modal Anomaly Detection and Reinforcement Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
We Ship ML Algorithms to Prod Without Rewrites (Or ML Engineers)
shlep.aiยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
The Subtle Art of Taming Flows and Coroutines in Kotlin, or 'How Not to DDoS Yourself with Server-Sent Events'
cekrem.github.ioยท21hยท
Discuss: r/programming, r/webdev
๐ŸŒŠStreaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap