๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ค AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Microsoft Excel adds Copilot AI to help fill in spreadsheet cells
theverge.com
ยท
1d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
AWS pricing for Kiro dev tool dubbed 'a wallet-wrecking tragedy'
theregister.com
ยท
2d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
Simpler Category Theory
ryanbrewer.dev
ยท
5h
ยท
Discuss:
Hacker News
๐
Cyber security
From Vibe-Coding to Trash-Coding โ Short-Story
etsd.tech
ยท
1d
ยท
Discuss:
Hacker News
๐
Cyber security
The System Inside the System
worksonmymachine.ai
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
๐
Cyber security
Even if snap out of the AI bubble, we are never going to get these years back
coppolaemilio.com
ยท
1d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
AI tooling must be disclosed for contributions
github.com
ยท
20h
ยท
Discuss:
Hacker News
๐
Cyber security
Simple Python Calculator Game for Beginners
dev.to
ยท
2d
ยท
Discuss:
DEV
๐ต
Threat intelligence
The Single Most Critical Factor for Enterprise AI? Itโs Not the Model
dev.to
ยท
11h
ยท
Discuss:
DEV
๐ต
Threat intelligence
Predicting Customer Churn with TensorFlow โ A Beginner-Friendly Guide
dev.to
ยท
2d
ยท
Discuss:
DEV
๐ต
Threat intelligence
Real-time AI mock interviews enhance interview skills
dev.to
ยท
3d
ยท
Discuss:
DEV
๐ต
Threat intelligence
Google launches the Pixel 10 series, base model now has three-cameras
techcrunch.com
ยท
2h
๐ต
Threat intelligence
AIโs Billion-Dollar Showdown: Tech Titans Clash in a Race for Supremacy
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ต
Threat intelligence
Generative AI: Under the hood
dev.to
ยท
3d
ยท
Discuss:
DEV
๐ต
Threat intelligence
Anderson Acceleration For Perturbed Newton Methods
arxiv.org
ยท
1d
๐ต
Threat intelligence
Perspt: Your Terminal's New AI Powerhouse!
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ต
Threat intelligence
GPU Costs Melting Your Budget
dev.to
ยท
2d
ยท
Discuss:
DEV
๐
Cyber security
Developing a Responsible AI Framework for Healthcare in Low Resource Countries: A Case Study in Nepal and Ghana
arxiv.org
ยท
1d
๐
Cyber security
When Secure Aggregation Falls Short: Achieving Long-Term Privacy in Asynchronous Federated Learning for LEO Satellite Networks
arxiv.org
ยท
14h
๐
Cyber security
Artificial intelligence (AI) techniques: a game-changer in Digital marketing for shop
arxiv.org
ยท
1d
๐ต
Threat intelligence
Loading...
Loading more...
« Page 17
โข
Page 19 »