๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽผ Acoustic Analysis

Sound Authentication, Audio Verification, Voice Forensics, Frequency Investigation

Threat Bulletin: Fire in the Woods โ€“ A New Variant of FireWood
intezer.comยท18h
๐ŸŒณArchive Merkle Trees
It's the certificates, stupid!
reverse.put.asยท2d
๐ŸบKerberos Archaeology
How to Use LLMs for Powerful Automatic Evaluations
towardsdatascience.comยท12h
๐Ÿ”—Constraint Handling
Show HN: Bring Your Video to Life with MMAudio AI
mmaudio.appยท4dยท
Discuss: Hacker News
๐ŸŽงLearned Audio
Compare: Bash Elvish NuShell Murex es-shell fish xonsh PowerShell Oil Ion
gist.github.comยท1dยท
Discuss: Hacker News
๐ŸšNordic Shell
A Bash shell script designed to assess and report on battery health metrics
metasage.comยท2dยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Forensics
Stack Overflow is trying to honeypot their data dump
meta.stackexchange.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Do we understand how neural networks work?
verysane.aiยท8hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Fine-Tune Your Topic Modeling Workflow with BERTopic
towardsdatascience.comยท1d
๐Ÿ“ŠFeed Optimization
Learn the Future: Artificial Intelligence Course in Chandigarh
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปCS
Unsafe at Any Speed: It's Not the Hackers or the Usersโ€”It's the Software
usenix.orgยท1d
๐Ÿ›กCybersecurity
Jukebox with the DFPlayer
hackster.ioยท18h
๐ŸŽตGameboy Sound
BlackBerry Limited (BB) Management presents at Canaccord Genuity 45th Annual Growth Conference (Transcript)
seekingalpha.comยท12h
๐Ÿ”ŒInterface Evolution
Samsara: Valuation Compression Helps, But Execution Still Holds The Key
seekingalpha.comยท22h
๐Ÿ”BitFunnel
Enhanced Topology Optimization via Multi-Fidelity Bayesian Surrogate Modeling and Reinforcement Learning Feedback
dev.toยท18hยท
Discuss: DEV
โšกIncremental Computation
Fortinet Products Are in the Crosshairs Again
darkreading.comยท10h
๐Ÿ”“Hacking
Fragmented security: the hidden threat undermining your cyber defenses
techradar.comยท1h
๐Ÿ”“Hacking
Fuzzy-Pattern Tsetlin Machine
arxiv.orgยท1d
๐Ÿ”คMorris-Pratt
Securely launch and scale your agents and tools on Amazon Bedrock AgentCore Runtime
aws.amazon.comยท10h
๐ŸŒŠStreaming Systems
Learning to Defer in Congested Systems: The AI-Human Interplay
arxiv.orgยท4h
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap