๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

From Data Swamps to Reliable Data Systems: How Iceberg Brought 40 Years of Database Wisdom to Data Lakes
blog.min.ioยท1d
๐ŸบDatabase Archaeology
Stock Market: From Zero to Hero
pomegra.ioยท1dยท
Discuss: Hacker News
๐Ÿ”BitFunnel
XMPP: When a 25-Year-Old Protocol Becomes Strategic Again
process-one.netยท1dยท
Discuss: Hacker News
๐Ÿ“ŸHistorical Protocols
The Psychology of Deception โ€“ By Caroline Orr Bueno, PhD
weaponizedspaces.substack.comยท1dยท
Discuss: Substack
๐ŸŽฏThreat Hunting
How we are trying to disrupt Stripe with open-source
useautumn.comยท2dยท
Discuss: Hacker News
๐Ÿ“กBGP Archaeology
AI Turns Common Heart Test Into a Life-Saving Screening Tool
scitechdaily.comยท1d
๐ŸŽตAudio ML
Ask HN: Why are ePub images so tiny?
news.ycombinator.comยท6hยท
Discuss: Hacker News
๐Ÿ“•Bookbinding
API tests as the single source of truth for docs, SDKs, and AI agents
scheduleddowntime.comยท4dยท
Discuss: Hacker News
๐Ÿ”—Hypermedia APIs
Leveraging AI Multi-Agent Systems in Financial Analysis
cacm.acm.orgยท2d
๐ŸงฎZ3 Applications
PyDocs โ€“ A modern open-source site to learn Python from scratch.
dev.toยท2dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Optimising Call Centre Operations using Reinforcement Learning: Value Iteration versus Proximal Policy Optimisation
arxiv.orgยท1d
๐Ÿ”ฒCellular Automata
Post-Hackathon Blue Is Real๐Ÿ˜”
dev.toยท1dยท
Discuss: DEV
๐Ÿš€Indie Hacking
Vibecoding a High Performance System
andrewkchan.devยท4dยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Lightning Voice Gaming Controller - Real-Time AssemblyAI Performance
dev.toยท11hยท
Discuss: DEV
๐ŸŽฌWebCodecs
GVCCS: A Dataset for Contrail Identification and Tracking on Visible Whole Sky Camera Sequences
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
ToolShell Mass Exploitation (CVE-2025-53770)
research.eye.securityยท6dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
testcontainers: improving E2E tests
dev.toยท2dยท
Discuss: DEV
๐ŸงชCBOR Fuzzing
What is 'dirty' data and why is it important for businesses to eliminate it?
techradar.comยท1d
๐Ÿ”—Data Provenance
PDB-Eval: An Evaluation of Large Multimodal Models for Description and Explanation of Personalized Driving Behavior
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
I-CEE: Tailoring Explanations of Image Classification Models to User Expertise
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap