🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Systems Hardening
IPv6 and Proxying Enhancements in DragonFly BSD
discoverbsd.com·3h
🛡️eBPF Security
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·16h
🎯Threat Hunting
Ratcheting to zero: How incremental constraints eliminate technical debt
testdouble.com·2d
⚡Incremental Computation
Ubuntu disables Intel GPU security mitigations, promises 20% performance boost
arstechnica.com·15h
🛡️RISC-V Security
Toward Decision-Oriented Prognostics: An Integrated Estimate-Optimize Framework for Predictive Maintenance
arxiv.org·1d
🌡️Preservation Entropy
How to Write a Software Project Proposal: Complete Template & Guide
dev.to·5h·
Discuss: DEV
🦋Format Metamorphosis
The $10M Dilemma That Could Make or Break Your AI Business in 2025
techolution.com·1h·
Discuss: Hacker News
🛡️Error Boundaries
The Internal Inconsistency of Large Language Models
blog.kortlepel.com·1d·
Discuss: Hacker News
💻Local LLMs
SRE'ing the SRE AI Agents - DevConf.CZ 2025
youtube.com·2h
⚙️TLA+
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·7h
🔍BitFunnel
Code-First Reliability in Payment Systems
news.alvaroduran.com·1d·
Discuss: Hacker News
🔄Reproducible Builds
Structured Logging in NextJS with OpenTelemetry
dev.to·2h·
Discuss: DEV
📝Log Parsing
How and Why to Use Patches
dev.to·1d·
Discuss: DEV
📦Package Managers
The complexity trap: why cybersecurity must be simplified
techradar.com·1d
🛡Cybersecurity
Writing Toy Software Is a Joy
quiz.businessexplain.com·7h·
Discuss: Hacker News
🔩Systems Programming
Generative AI Exacerbates Software Supply Chain Risks
darkreading.com·21h
🔒WASM Capabilities
Intel GPUs Gain 20% Performance by Disabling Security Mitigations
techpowerup.com·3d·
Discuss: Hacker News
🛡️RISC-V Security
Single Core Hundred Thousand Concurrency(1750866547511600)
dev.to·19h·
Discuss: DEV
🌊Stream Processing
Critical Security Importance Digital Age Web Techniques(1750777701670000)
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
9 Nerdy Ways to SSH into a Server
adaptive.live·3h·
Discuss: Hacker News
🔌Operating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap