Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⭕ Consistent Hashing
Load Distribution, Ring Architecture, Partition Strategy, Caching
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123544
posts in
1.51
s
The
Datacenter
as a Computer: An Introduction to the Design of
Warehouse-Scale
Machines, Second Edition
research.google
·
1d
·
Discuss:
Hacker News
🗄️
Database Sharding
A pilot study on protocol consistency and graph metric
reproducibility
in microstructure-weighted
connectomes
nature.com
·
1d
⚖️
CAP Theorem
Development
statistics
for the 6.19
kernel
lwn.net
·
34m
·
Discuss:
r/linux
⚡
Zero-Copy
Certificate Automation: The
ACME
Protocol coming soon at
Gandi
news.gandi.net
·
14h
📡
gRPC
[
HodlAI
]
HodlAI
上下文限制问题
v2ex.com
·
14h
⚡
Zero-Copy
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
5d
·
Discuss:
Hacker News
🗄️
Database Sharding
QoS
/ Traffic Shaping in
Bazzite
lemmy.ml
·
1d
🚀
QUIC Protocol
Linux
Zoned
Storage
Ecosystem
zonedstorage.io
·
2d
⚖️
CAP Theorem
Unveiling
Bagel
: Why Your Developer's Laptop is the
Softest
Target in Your Supply Chain
boostsecurity.io
·
6h
🌐
WebAssembly
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
2d
·
Discuss:
Hacker News
📡
gRPC
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
·
3d
·
Discuss:
Hacker News
,
Hacker News
⚡
Zero-Copy
One Platform to Run Apps, Data, and AI
Anywhere
nutanix.com
·
5h
🔗
Distributed Systems
Caching
in 2026: Fundamentals,
Invalidation
, and Why It Matters More Than Ever
lukasniessen.medium.com
·
3d
·
Discuss:
r/node
📡
gRPC
Performance Tip of the Week #26: Fixing things with
hashtable
profiling
abseil.io
·
4d
🎯
Bitboards
Machine learning reveals hidden
landscape
of
robust
information storage
phys.org
·
1d
⚖️
CAP Theorem
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
·
12h
🔄
CRDT
$\
mathsf
{SoK}$: On
Cryptography
for Multi-Cloud Storage
eprint.iacr.org
·
2d
⚖️
CAP Theorem
What I’m Learning in Data Structures: The Algorithm Behind
Compression
(
bzip
, etc.)
dev.to
·
1h
·
Discuss:
DEV
🌲
B-Trees
Flash Freezing Flash Boys:
Per-transaction
encryption to fight malicious
MEV
cointelegraph.com
·
1d
⚡
Zero-Copy
A Technical Guide to
Stealth
Addresses
and On-Chain Privacy
hackernoon.com
·
2d
🚀
QUIC Protocol
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help