🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌍 Cultural Computing

Indigenous Technology, Regional Innovation, Computing Heritage, Digital Anthropology

Congratulations to this year’s conference bursary winners!
adho.orgΒ·22h
πŸ›Digital humanities
Don't sell shovels, sell treasure maps
platforms.substack.comΒ·1dΒ·
Discuss: Substack
🏠Homelab Archaeology
Show HN: Sapient – Agentic Game Development in Unreal Engine (C++, BPs, BTs)
sapientstudio.comΒ·1dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
TekNix Corporation 2025: Strategic Enterprise Performance Optimization
dev.toΒ·5hΒ·
Discuss: DEV
❄️Nix Adoption
Urban Green Governance: IoT-Driven Management and Enhancement of Urban Green Spaces in Campobasso
arxiv.orgΒ·10h
⚑Incremental Computation
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.comΒ·1dΒ·
Discuss: Hacker News
🌐WASI
Why Aggregators Ate the Internet
every.toΒ·1hΒ·
Discuss: Hacker News
🌊Streaming Systems
Google I/O Connect 2025 Recap: Gemini, Open Models, and AI in Action
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Starting Project Now? My 2025 Tech Stack for Full Stack Development
hackernoon.comΒ·7h
πŸ”ŒInterface Evolution
The Unknown Unknown
hugston.comΒ·23hΒ·
Discuss: Hacker News
🌑️Preservation Physics
Pluralistic: Ellen Ullman's "Close to the Machine" (16 Jul 2025)
pluralistic.netΒ·21hΒ·
Discuss: Hacker News
🧲Magnetic Philosophy
Is AI poisoning the scientific literature? Our comment in Nature
anil.recoil.orgΒ·1dΒ·
Discuss: Hacker News
πŸ“œDigital Philology
When Familiarity Remains: Procedural Memory, Symbolic Anchors, and Digital Engagement in Dementia Care
arxiv.orgΒ·2d
🎨Nordic Design
AI Race With China Risks Undermining Western Values
hackernoon.comΒ·7h
πŸ‡¨πŸ‡³Chinese Computing
Africans survived 10,000 years of climate changes by adapting food systems: Study offers lessons for modern times
phys.orgΒ·1d
🦴Database Paleontology
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgΒ·10h
πŸ•΅οΈVector Smuggling
How I Built an App in 7 Hours with Gemini, Gemini CLI and Gemini Code Assist
medium.comΒ·21hΒ·
Discuss: Hacker News
πŸ¦‹Format Metamorphosis
Are we trading our hard-earned intelligence for convenience?
lmyslinski.comΒ·5hΒ·
Discuss: Hacker News
πŸ“Code Metrics
Amazon EKS now supports 100K nodes per cluster
aws.amazon.comΒ·1dΒ·
Discuss: Hacker News
🌊Streaming Systems
"Kiro" Why This Name Perfectly Captures the AI Development Crossroads
dev.toΒ·1dΒ·
Discuss: DEV
πŸ‡―πŸ‡΅Japanese Computing
Loading...Loading more...
AboutBlogChangelogRoadmap