πΏοΈ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π€ AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Naval Ravikant and Aaron Stupple β How to Raise a Sovereign Child
andrewarrow.dev
Β·
14h
Β·
Discuss:
Hacker News
π
Cyber security
Can AI weaponize new CVEs in under 15 minutes?
valmarelox.substack.com
Β·
3d
Β·
Discuss:
Substack
π
Cyber security
The Hidden Costs of Coding With Generative AI
sloanreview.mit.edu
Β·
6d
Β·
Discuss:
Hacker News
π΅
Threat intelligence
Why AI-Driven Client Apps Donβt Understand Your API
oreilly.com
Β·
5d
π΅
Threat intelligence
Do you have too many AI products?
frontierai.substack.com
Β·
3d
Β·
Discuss:
Substack
π΅
Threat intelligence
How to Push Back Against Unreasonable Management Expectations in the Age of AI?
deepdocs.dev
Β·
4d
Β·
Discuss:
Hacker News
,
r/programming
π΅
Threat intelligence
The Kubernetes Experience
reddit.com
Β·
13h
Β·
Discuss:
r/kubernetes
π
Cyber security
ChatGPT is pulling from Google Search to answer your questions
tomsguide.com
Β·
2d
Β·
Discuss:
Hacker News
π
Cyber security
Show HN: openai/reflect β Physical AI Assistant that illuminates your life
github.com
Β·
5d
Β·
Discuss:
Hacker News
,
Hacker News
π
Cyber security
Deep Equilibrium Convolutional Sparse Coding for Hyperspectral Image Denoising
arxiv.org
Β·
3d
π΅
Threat intelligence
EmoSLLM: Parameter-Efficient Adaptation of LLMs for Speech Emotion Recognition
arxiv.org
Β·
4d
π΅
Threat intelligence
CoBAD: Modeling Collective Behaviors for Human Mobility Anomaly Detection
arxiv.org
Β·
4d
π
Cyber security
Advanced Microbial Fuel Cell Optimization via Hyperdimensional Data Fusion and Adaptive Enzyme Engineering
dev.to
Β·
3d
Β·
Discuss:
DEV
π΅
Threat intelligence
Why 95% Of AI Pilots Fail, And What Business Leaders Should Do Instead
forbes.com
Β·
3d
Β·
Discuss:
Hacker News
π΅
Threat intelligence
Stopped Using Cursor, for Now
news.ycombinator.com
Β·
2d
Β·
Discuss:
Hacker News
π
Cyber security
Synthesis and SOS-based Stability Verification of a Neural-Network-Based Controller for a Two-wheeled Inverted Pendulum
arxiv.org
Β·
3d
π΅
Threat intelligence
Synthetic Data is Sufficient for Zero-Shot Visual Generalization from Offline Data
arxiv.org
Β·
6d
π΅
Threat intelligence
The Open-Source App Builder That Ate SaaS: Dyad + Ollama Setup
dev.to
Β·
3d
Β·
Discuss:
DEV
π
Cyber security
TOM: An Open-Source Tongue Segmentation Method with Multi-Teacher Distillation and Task-Specific Data Augmentation
arxiv.org
Β·
3d
π
Cyber security
Sponge: A Framework That Reshapes the Go Development Experience and Supercharges Your Projects
dev.to
Β·
18h
Β·
Discuss:
DEV
π
Cyber security
Loading...
Loading more...
« Page 48
β’
Page 50 »