🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡¨πŸ‡³ Chinese Computing

GB Character Sets, CJK Text Processing, Cultural Encoding, Great Firewall

The cloud-native imperative for effective cyber resilience
theregister.comΒ·12h
πŸ’ΎPersistence Strategies
Show HN: Sumble – knowledge graph for GTM data – query tech stack, key projects
sumble.comΒ·11hΒ·
Discuss: Hacker News
πŸ•ΈοΈNeo4j
The First AI Coding Style Guide
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ“Text Compression
I Built CGMB: An MCP That Unifies Claude Code, Gemini CLI, and Gemini API
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
Rollback UX: What Fighting Game Netcode Can Teach AI Tool Designers
medium.comΒ·1dΒ·
Discuss: Hacker News
🌍Cultural Algorithms
Architect's Guide to Micro-Front Ends: Module Federation with React and Angular
developersvoice.comΒ·19hΒ·
Discuss: Hacker News
🌐WASI
Libpostal: C library for parsing/normalizing street addresses around the world
github.comΒ·1hΒ·
Discuss: Hacker News
πŸ“Concrete Syntax
Unlock Go's HTTP Potential: See Our Performance Benchmarks ✨
dev.toΒ·11hΒ·
Discuss: DEV
🌊Streaming Systems
GlobalFoundries to make RISC-V CPUs β€” fab acquires MIPS, will integrate RISC-V and AI IP into its portfolio
tomshardware.comΒ·9h
πŸ›‘οΈRISC-V Security
Modern Electric Vehicle Infrastructure Security
ocpp.usΒ·22hΒ·
Discuss: Hacker News
πŸ“»Homebrew Protocols
Run Your Python Code up to 80x Faster Using the Cython Library
towardsdatascience.comΒ·21h
⚑SIMD Optimization
Semantically Separating Nominal Wyvern for Usability and Decidability
arxiv.orgΒ·23h
πŸ’»Programming languages
DoPI: Doctor-like Proactive Interrogation LLM for Traditional Chinese Medicine
arxiv.orgΒ·23h
πŸŽ™οΈWhisper
Writing an LLM from scratch, part 16 -- layer normalisation
gilesthomas.comΒ·7hΒ·
Discuss: Hacker News
πŸ“ŠQuantization
The Next Frontier for AI is Your Laptop: Are Your Dev Tools Ready for the Shift?
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
How does ChatGPT generate human-like text?
dev.toΒ·5hΒ·
Discuss: DEV
πŸŽ™οΈWhisper
Skipper: Maximal Matching with a Single Pass over Edges
arxiv.orgΒ·23h
πŸ”—Graph Isomorphism
Persistent Exploitation of ASP.NET Components Fuels Remote Code Execution Attacks
research.kudelskisecurity.comΒ·1d
🌐WASI
Preserving Privacy, Increasing Accessibility, and Reducing Cost: An On-Device Artificial Intelligence Model for Medical Transcription and Note Generation
arxiv.orgΒ·23h
🎡Audio ML
Time Space Breakthrough, Ancient Memory Systems & An I-Ching Inspired Hyper-Stack Scheduler
hackernoon.comΒ·2d
⚑Cache Theory
Loading...Loading more...
AboutBlogChangelogRoadmap