🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Cassette Hacks

Data Encoding, Magnetic Media, Analog Computing, Tape Loops

Episciences links article code through Software Heritage
softwareheritage.org·20h
🏛️OAIS Implementation
A recipe for creating random fractals
johndcook.com·20h
📐Mathematical Art
My Sony Ericsson W810i, part 2
thefoggiest.dev·1d
🕸️WASM Archives
Encrypting a Debian install with UKI
anarc.at·1d
🔒Secure Boot
Documents: The architect’s programming language
stackoverflow.blog·1d
💾Persistence Strategies
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
microsoft.com·3d
🌐DNS Security
UPS for Nas devices
forums.anandtech.com·12h
🏠Homelab Preservation
Bring Your Own Model to Chat in Visual Studio
devblogs.microsoft.com·2h·
Discuss: Hacker News
🎙️Whisper
Show HN: Using Common Lisp from Inside the Browser
turtleware.eu·22h·
Discuss: Lobsters, Hacker News
🧠Lisp Dialects
'Delulu,' 'Skibidi' and 'Tradwife' Are Among More Than 6,000 Words Added to the Cambridge Dictionary
smithsonianmag.com·1d
🌀Brotli Dictionary
America's people shortage is about to get real. Colleges, companies, and cities are unprepared.
businessinsider.com·1d
🔲Cellular Automata
Macroeconomic Foundation of Monetary Accounting by Diagrams of Categorical Universals
arxiv.org·1d
🔀Category Theory
Update Your Apple Devices ASAP to Patch This Major Security Flaw
lifehacker.com·16h
🔓Hacking
One-Motor Drone Mimics Maple Seeds For Stability
hackaday.com·1d
⚙️Tape Transport
GEN2: A Generative Prediction-Correction Framework for Long-time Emulations of Spatially-Resolved Climate Extremes
arxiv.org·6h
⚡Incremental Computation
How AI-Created Code Will Strain DevOps Workflows
devops.com·18h
⚙️Proof Engineering
How Outer Space Became the Next Big Attack Surface
darkreading.com·1d
🔍Polish Cryptanalysis
New formula improves accuracy of particle concentration measurements in diverse samples
phys.org·1d
🧪Cassette Chemistry
A Self-Ensemble Inspired Approach for Effective Training of Binary-Weight Spiking Neural Networks
arxiv.org·3d
🧠Machine Learning
How to Vibe Code With Security in Mind
darkreading.com·2d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap