🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🤖 AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Show HN: Slumpgenerator
slumpgenerator.com
·
1h
·
Discuss:
Hacker News
🕵
Threat intelligence
Reverse-engineering the Globus INK, a Soviet spaceflight navigation computer
righto.com
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Two Dogmas of Empiricism
en.wikipedia.org
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Tecton is Joining Databricks to Power Real-Time Data for Personalized AI Agents
databricks.com
·
3d
·
Discuss:
Hacker News
🕵
Threat intelligence
GPT-5 and SQL code generation
beekeeperstudio.io
·
5d
·
Discuss:
Hacker News
🕵
Threat intelligence
Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet
simonwillison.net
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Marines managed to get past an AI powered camera "undetected" by hiding in boxes
rudevulture.com
·
5d
·
Discuss:
Hacker News
🕵
Threat intelligence
How AI Is Driving Us Back to Human Connection at Work
people-work.io
·
5d
·
Discuss:
Hacker News
🔒
Cyber security
KPMG Wrote 100-Page Prompt To Build Agentic TaxBot
slashdot.org
·
4d
🕵
Threat intelligence
Four ways learning Econ makes people dumber re: future AI
lesswrong.com
·
5d
·
Discuss:
Hacker News
🔒
Cyber security
Adding MCP
funcall.blogspot.com
·
1d
·
Discuss:
Hacker News
🔒
Cyber security
DuPO: Enabling Reliable LLM Self-Verification via Dual Preference Optimization
arxiv.org
·
5d
·
Discuss:
Hacker News
🕵
Threat intelligence
Memento: A Survival Guide for Building Real Software with a Forgetful Genius
dev.to
·
4d
·
Discuss:
DEV
🕵
Threat intelligence
Artificial Intelligence Transforming the Future
dev.to
·
4d
·
Discuss:
DEV
🕵
Threat intelligence
Automated Viscosity Measurement Calibration via Deep Learning and Bayesian Optimization
dev.to
·
6d
·
Discuss:
DEV
🔒
Cyber security
The Dual Impact of Virtual Reality: Examining the Addictive Potential and Therapeutic Applications of Immersive Media in the Metaverse
arxiv.org
·
18h
🔒
Cyber security
What I Learned From a Week of AI-Assisted Coding: The Good, The Bad, and The Surprisingly Counterintuitive
dev.to
·
6d
·
Discuss:
DEV
🕵
Threat intelligence
Deep Reinforcement Learning for Dynamic Reactor Network Optimization via Digital Twin Simulation
dev.to
·
5d
·
Discuss:
DEV
🕵
Threat intelligence
Generative Foundation Model for Structured and Unstructured Electronic Health Records
arxiv.org
·
1d
🕵
Threat intelligence
When Code Starts Talking Back: A Love-Hate Story
dev.to
·
2d
·
Discuss:
DEV
🔒
Cyber security
Loading...
Loading more...
« Page 57
•
Page 59 »