๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ Archive Verification

Formal Proofs, Storage Correctness, Integrity Checking, Preservation Logic

Researchers explore machine learning to automate early modern text transcription ethically
phys.orgยท10h
๐Ÿ“œDigital Philology
VCF 9.0 Hardware BOM for Silicon Valley VMUG
williamlam.comยท5h
๐Ÿ HomeLab
CVE-2024-12029 โ€“ InvokeAI Deserialization of Untrusted Data vulnerability
offsec.comยท1d
๐ŸŒWASI
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท2d
๐Ÿ”“Password Cracking
Claude Code on Amazon Bedrock - Anthropic
docs.anthropic.comยท21h
๐Ÿ‘‘Isabelle
Why Every Go Library Should Implement Must* Methods
blog.cansu.devยท16hยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Distant Writing: Literary Production in the Age of Artificial Intelligence
papers.ssrn.comยท1dยท
Discuss: Hacker News
๐Ÿ›Digital humanities
Using Omni's AI Assistant on the Semantic Layer
mikkeldengsoe.substack.comยท14hยท
Discuss: Substack
๐ŸŒ€Brotli Internals
How AI Can Speed up Modernization of Your Legacy IT Systems
thenewstack.ioยท11h
๐Ÿ›๏ธMainframe Archaeology
Frequently Asked Questions about FHE
jeremykun.comยท9hยท
Discuss: Lobsters, Hacker News
๐Ÿ”Homomorphic Encryption
How To Build an AI Health Care Agent on Amazon Bedrock
thenewstack.ioยท1d
๐Ÿ”ŒArchive APIs
The Impact of Prompt Bloat on LLM Output Quality
mlops.communityยท1dยท
Discuss: Hacker News
โœจEffect Handlers
Artisanal Handcrafted Git Repositories
drew.silcock.devยท2dยท
Discuss: Lobsters, Hacker News
๐ŸŒณGit Internals
The Generative Energy Arena (GEA): Incorporating Energy Awareness in Large Language Model (LLM) Human Evaluations
arxiv.orgยท23h
๐Ÿง Intelligence Compression
Boffins detail new algorithms to losslessly boost AI perf by up to 2.8x
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Automating Dropbox to Google Drive Backups with n8n
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Archive Automation
MCP with Postgres โ€“ Querying my data in plain English
punits.devยท21hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Show HN: Default-Exploitability Context for CISA Known Exploited Vulnerabilities
github.comยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ›ก๏ธCBOR Security
Manage multi-tenant Amazon Bedrock costs using application inference profiles
aws.amazon.comยท10h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.orgยท1d
๐Ÿ”Quantum Security
Loading...Loading more...
AboutBlogChangelogRoadmap