🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 DNS Archaeology

Historical Records, Protocol Evolution, Name System Heritage, Internet History

Show HN: Asimov's three laws, a working implementation (don't use in production)
maybedont.ai·12h·
Discuss: Hacker News
⚖️Emulation Ethics
RomM 4.2 Launches with Console Mode and Smarter Library Tools
gardinerbryant.com·16h·
Discuss: Hacker News
🕹️Retro Gaming
Fixing my gripes with GitHub using Gleam and a Raspberry Pi
giacomocavalieri.me·1d·
Discuss: Lobsters, Hacker News
🌀Brotli Internals
Stop chatting Constrained VS Unconstrained LLM use cases
medium.com·1d·
Discuss: Hacker News
💻Local LLMs
Animal remains suggest first modern humans in central Iberian Peninsula were expert hunters
phys.org·1d
🦴Database Paleontology
Experimenting with local LLMs on macOS
blog.6nok.org·1d·
Discuss: Lobsters, Hacker News
💻Local LLMs
Eat Your Vegetables Before AI Dessert
writings.alethia.news·18h·
Discuss: Hacker News
⚙️Proof Engineering
I tested Site24x7, and found it a solid all-in-one IT monitoring solution
techradar.com·1d
📊Homelab Monitoring
The hidden plastic problem in your daily dental routine, and what's being done about it
phys.org·14h
📼Cassette Archaeology
Defense Dept didn't protect social media accounts, left stream keys out in public
theregister.com·14h
🛡Cybersecurity
How Google dodged a major breakup – and why OpenAI is to thank for it
theguardian.com·18h·
Discuss: Hacker News
🤖AI Curation
GPT-5 Thinking in ChatGPT (aka Research Goblin) is shockingly good at search
simonw.substack.com·3d·
Discuss: Substack
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
The End-to-End Data Scientist’s Prompt Playbook
towardsdatascience.com·1d
⚡Proof Automation
Multimodal Contrastive Pretraining of CBCT and IOS for Enhanced Tooth Segmentation
arxiv.org·3h
🧠Machine Learning
CancerGUIDE: Cancer Guideline Understanding via Internal Disagreement Estimation
arxiv.org·3h
🧠Machine Learning
Q-SafeML: Safety Assessment of Quantum Machine Learning via Quantum Distance Metrics
arxiv.org·2d
🔐Quantum Security
**Go System Call Optimization: Reducing Kernel Transitions for High-Performance Applications**
dev.to·2d·
Discuss: DEV
🌊Stream Processing
Supply chain attack targets npm, +2 Billion weekly npm downloads exposed
securityaffairs.com·13h
🎫Kerberos Attacks
ADHAM: Additive Deep Hazard Analysis Mixtures for Interpretable Survival Regression
arxiv.org·3h
🧠Machine Learning
Looking for advice: how to properly separate my homelab from my home network?
reddit.com·2h·
Discuss: r/homelab
🖥Home Lab Setup
Loading...Loading more...
AboutBlogChangelogRoadmap