🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔄 CRC Algorithms

Polynomial Codes, Error Detection, Cyclic Redundancy, Data Integrity

More From Casual
irreal.org·1d
🦀Rust Macros
Why not Matrix (2023)
telegra.ph·3d·
Discuss: Hacker News
🌊Stream Ciphers
Network tokens, the payment tech you've never heard of
birchtree.me·1d·
Discuss: Hacker News
⏳Time Capsule Networks
Why Postgres CDC to Iceberg isn't a solved problem: lessons from production
risingwave.com·3d·
Discuss: Hacker News
🌊Streaming Databases
Vibe Coding but not what you think
amritpandey.io·1d·
Discuss: Hacker News
📏Code Metrics
Encode any data into a mnemonic, with custom dictionary.
github.com·3d·
Discuss: r/golang
📦Deflate
Scientific tools are tracing the evolution of ancient biblical manuscripts
phys.org·3h
📏Manuscript Metrics
Best Practices for Writing Efficient MySQL Queries on Big Data
dev.to·7h·
Discuss: DEV
🚀Query Optimization
Build dynamic web research agents with the Strands Agents SDK and Tavily
aws.amazon.com·1d
🏠Homelab Orchestration
Modernize your identity defense with Microsoft Identity Threat Detection and Response
microsoft.com·1d
🚨Incident Response
Smart Segments: Krita plugin that adds Segment Anything object selection using
github.com·2d·
Discuss: Hacker News
⟷Bidirectional Programming
RubyLLM 1.4.0: Structured Output, Custom Parameters, and Rails Generators
github.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security
arxiv.org·2d
🎯Threat Hunting
What kind of motherboards do you like?
forums.anandtech.com·5h
🔌Operating system internals
Automate the creation of handout notes using Amazon Bedrock Data Automation
aws.amazon.com·2d
🤖Archive Automation
A Study on Variants of Conventional, Fuzzy, and Nullspace-Based Independence Criteria for Improving Supervised and Unsupervised Learning
arxiv.org·2d
🧠Machine Learning
Spec-VLA: Speculative Decoding for Vision-Language-Action Models with Relaxed Acceptance
arxiv.org·1d
💻Local LLMs
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight
tenable.com·2d
🛡Cybersecurity
From Red Errors to Real Confidence
dev.to·1d·
Discuss: DEV
⚔️Lean Tactics
SigBERT: Combining Narrative Medical Reports and Rough Path Signature Theory for Survival Risk Estimation in Oncology
arxiv.org·13h
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap