๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฆพ ARM Cortex-M

Embedded Architecture, Real-time Systems, IoT Security, Hardware Abstraction

Skills useful to learn for robotics engineering
newsletter.pragmaticengineer.comยท10h
๐Ÿ“ŠQuantization
MIPS and GlobalFoundries: Powering the Next Wave of Physical AI
mips.comยท4hยท
Discuss: Hacker News
๐ŸงฒRISC-V Preservation
On Jailbreaking Quantized Language Models Through Fault Injection Attacks
arxiv.orgยท23h
๐Ÿ”งBinary Parsers
Cybersecurity Consulting Lab
reddit.comยท2hยท
Discuss: r/homelab
๐Ÿ HomeLab
IBM boasts new Power11 chips are stingy on power usage
theregister.comยท5h
๐Ÿ–ฅ๏ธHardware Architecture
Unlocking the untapped potential of machine learning on FPGAs with DevOps
dev.toยท2hยท
Discuss: DEV
๐ŸŽตAudio ML
ufrisk/MemProcFS
github.comยท2h
๐Ÿ› ๏ธGreaseweazle
Superimposed codes, take two
blog.sesse.netยท8h
๐Ÿ”ขBitwise Algorithms
An open-source SDK for finding dead code
blog.sentry.ioยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Preventing Reentrancy Bugs From Creeping Back In: Linking TLA+ Models to Rust Code
medium.comยท8hยท
Discuss: Lobsters
๐Ÿ›๏ธAgda
Breakthrough in Semiconductor Technology Paves the Way for Faster 6G Networks
techbriefs.comยท13hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
Allwinner A527, T527, and A733 datasheets, user manuals, and Linux SDK released
cnx-software.comยท1d
๐Ÿ”ŒMicrocontrollers
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.comยท14hยท
Discuss: Substack
๐Ÿ’ปLocal LLMs
NRF54L15 Electromagnetic Fault Injection
blog.syss.comยท15hยท
Discuss: Hacker News
๐ŸŽฏEmulation Accuracy
How To Build Smarter Factories With Edge Computing
thenewstack.ioยท10h
๐Ÿ Homelab Orchestration
x8dtu โ€“ main ssds: how worn are they?
dan.langille.orgยท11h
๐Ÿ”ŒOperating system internals
A Conversation with Val Bercovici about Disaggregated Prefill / Decode
fabricatedknowledge.comยท1d
๐Ÿ“ผTape Combinators
Bert Blitzes Linux & Windows Systems
darkreading.comยท1d
๐Ÿ”“Hacking
Writing an LLM from scratch, part 16 -- layer normalisation
gilesthomas.comยท8hยท
Discuss: Hacker News
๐Ÿ“ŠQuantization
Top Most Secure Smartphones of 2025 to Keep Your Data Safe
analyticsinsight.netยท1dยท
Discuss: Hacker News
๐Ÿ”HSM Integration
Loading...Loading more...
AboutBlogChangelogRoadmap