๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›๏ธ Byzantine Archiving

Distributed Preservation, Fault Tolerance, Consensus Protocols, Archive Replication

Q&A: How can the EU help startups go global?
politico.euยท19h
๐Ÿ”Capability Security
Get Back To WARP
binary.ninjaยท3d
๐ŸงชBinary Fuzzing
Twelve Medieval Types of Drunk, According to Oswald von Wolkenstein
medievalists.netยท8hยท
Discuss: Hacker News
๐Ÿ“œMedieval Computing
Drones to Deliver Mosquitoes to Prevent Bird Extinctions in Hawai'i
forbes.comยท9hยท
Discuss: Hacker News
๐ŸŒธBloom Variants
Mitigating Backpressure from High Join Amplification with Unaligned Joins
risingwave.comยท3dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
AI browsers could leave users penniless: A prompt injection warning
malwarebytes.comยท4h
๐Ÿš€Indie Hacking
Republican-led committee subpoenas documents from Jeffrey Epstein estate
theguardian.comยท40m
๐Ÿ’พData Preservation
Fine-Tuning and Deploying GPT Models Using Hugging Face Transformers
blog.jetbrains.comยท11h
๐Ÿค–Grammar Induction
A Neolithic Cow's Tooth Helps Point to the Mysterious Origins of Stonehenge's Iconic Stones
smithsonianmag.comยท4h
๐Ÿ—๏ธPaleocryptography
Linux desktop on Apple Silicon M1 in practice
gist.github.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Trump Stooges Keep Helping The President Indulge In His Vindictive Crime Fantasies
techdirt.comยท3h
๐Ÿ›กCybersecurity
Using game theory to explain how institutions arise naturally to manage limited resources
phys.orgยท3dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Strategies of Hope and Death: the US Foreign Policy Establishment Banks on Things Breaking Washingtonโ€™s Way Once Leaders of China, Iran, and Russia Eventually D...
nakedcapitalism.comยท12h
๐Ÿ‡ธ๐Ÿ‡ชSwedish Cryptanalysis
Dissecting My Recent Argument (Are Error Theories Offensive?)
nakedcapitalism.comยท13h
๐Ÿ”ฒProof Irrelevance
Mini-Omni-Reasoner: Token-Level Thinking-in-Speaking in Large Speech Models
arxiv.orgยท18h
๐ŸŽ™๏ธWhisper
AI-Driven Automation in Business Operations
dev.toยท9hยท
Discuss: DEV
๐ŸŒŠStream Processing
My Journey with Sentence Transformers, OpenAI Embeddings, and Vector Databases
dev.toยท14hยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
Solving the hyper-personalized AI privacy dilemma
techradar.comยท16h
๐Ÿ Home Automation
Braided magnetic flux ropes found at both human and light year scales
phys.orgยท4h
โš™๏ธTape Engineering
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
darkreading.comยท3d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap