๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’พ Binary codes
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท6h
๐Ÿ—‚๏ธVector Databases
Claude Code's 19 cent Parser
blogger.comยท21h
๐Ÿ”งBinary Parsers
Go Coding with Asparagos: The Smartest Peanut in the Neighborhood
dev.toยท4hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Show HN: DataCompose โ€“ Prevent downstream data failures with composite functions
datacompose.ioยท14hยท
Discuss: Hacker News
โœ…Format Validation
Sets & Heaps in Haskell and Rust
mmhaskell.comยท1d
๐Ÿ”’Type Safety
Guessing Game: Haskell Style
entropicthoughts.comยท12h
๐Ÿ‘‘Dependent Haskell
ChromaLex
hackster.ioยท2d
๐Ÿ“ฑQR Archaeology
What writing a failed rock-paper-scissors program taught me (or should have taught me) about sample size and uncertainty
statmodeling.stat.columbia.eduยท20h
๐ŸงฎKolmogorov Bounds
Generating C functions and prototypes using macros โ€“ part 2
subethasoftware.comยท9h
๐Ÿฆ€Rust Macros
Stable, Mutable References for Ante
antelang.orgยท21hยท
Discuss: Hacker News, r/programming
๐Ÿ”’Type Safety
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.comยท1d
๐ŸงชBinary Fuzzing
Game Genie declassified: That summer I played 230 Game Boy games
eurogamer.netยท4hยท
Discuss: Hacker News
๐ŸบGaming Archaeology
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท5hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
How Many Paths of Length K Are There Between a and B?
horace.ioยท1dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธGraph Algorithms
k-NN Classification and Model Evaluation
dev.toยท3hยท
Discuss: DEV
๐Ÿง Machine Learning
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ“Linear Algebra
Claude Code Gets a Second Opinion from GPT-5
proxymock.ioยท20hยท
Discuss: Hacker News
โšกProof Automation
A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.netยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”—Functional Compilers
Luhn algorithm โ€“ Credit card number verification
en.wikipedia.orgยท2dยท
Discuss: Hacker News
๐Ÿ”„CRC Algorithms
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท18hยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap