🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🤖 AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Show HN: Printablesudoku.net – Download and play printable Sudoku PDFs online
printablesudoku.net
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Show HN: Alertee.io – Catch data issues early with SQL-based checks
alertee.io
·
3h
·
Discuss:
Hacker News
🔒
Cyber security
A new ZSA product: The Navigator
newsletters.feedbinusercontent.com
·
22h
·
Discuss:
Hacker News
🕵
Threat intelligence
Self-Awareness And A Complex Brain
scientificamerican.com
·
20h
·
Discuss:
Hacker News
🕵
Threat intelligence
LLMs and the Russellian Inversion
philosophicalhacker.com
·
2d
·
Discuss:
Hacker News
🕵
Threat intelligence
Optimizing FizzBuzz in Rust
github.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
🕵
Threat intelligence
the core of rust
jyn.dev
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
r/rust
🔒
Cyber security
Resist AI – a handbook for concerned citizens
resist-ai.sh
·
6d
·
Discuss:
Hacker News
🕵
Threat intelligence
18 AI Coding Sidekicks That'll Make You Feel Like a Programming Wizard in 2025
vibe.forem.com
·
6d
·
Discuss:
DEV
🕵
Threat intelligence
The Developer’s Guide to AI Application Testing: 10 Essential Tools for 2025
dev.to
·
6d
·
Discuss:
DEV
🕵
Threat intelligence
A Multi-Agent Approach to Neurological Clinical Reasoning
arxiv.org
·
5d
🕵
Threat intelligence
Automated Regression Test Suite Optimization via Dynamic Prioritization and Adaptive Sampling
dev.to
·
4d
·
Discuss:
DEV
🕵
Threat intelligence
Online Incident Response Planning under Model Misspecification through Bayesian Learning and Belief Quantization
arxiv.org
·
5d
🔒
Cyber security
Simulation Results of Distributed Fair Assignment and Rebalancing in Mobility‑On‑Demand
hackernoon.com
·
18h
🔒
Cyber security
VR Fire safety training application
arxiv.org
·
1d
🔒
Cyber security
Adversarial Attacks against Neural Ranking Models via In-Context Learning
arxiv.org
·
4d
🕵
Threat intelligence
How I Use AI to Refactor Without Losing Control
dev.to
·
6d
·
Discuss:
DEV
🕵
Threat intelligence
The Rise of Open AI Models: Privacy, Control, and a New Era
dev.to
·
5d
·
Discuss:
DEV
🕵
Threat intelligence
Using Copilot with Legacy PHP: Lessons from Refactoring, Database Migration, and AI Hallucinations
dev.to
·
1d
·
Discuss:
DEV
🕵
Threat intelligence
From Pair Programming to AI Pair Partners: The Next Leap in Developer Collaboration
dev.to
·
5d
·
Discuss:
DEV
🕵
Threat intelligence
Loading...
Loading more...
« Page 55
•
Page 57 »