๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’พ Data Preservation

Archive.org

Promoting Fante Digitally: Fante Wikimedians Collaborate with Radio Windy Bay
diff.wikimedia.orgยท2h
๐Ÿ“œBinary Philology
WinRAR exploit enables attackers to run malicious code on your PC โ€” critical vulnerability patched in latest beta update
tomshardware.comยท19h
๐Ÿ’ฃZIP Vulnerabilities
Never Too Late: If you missed the IPKat last week!
ipkitten.blogspot.comยท1hยท
Discuss: ipkitten.blogspot.com
๐Ÿ“‹Swedish Patents
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท1d
๐Ÿ”NTLM Forensics
Guest post: In defense of direct replication studies (if they even need defending)
retractionwatch.comยท12h
๐ŸงฌCopy Number Variants
How to access geoblocked websites without a VPN
gralhix.comยท2d
๐Ÿดโ€โ˜ ๏ธPiracy
5 Cloud Storage Best Practices for AI Workloads
backblaze.comยท1d
๐Ÿ’พPersistence Strategies
A space for all people interested in gold and gold trading
xau-usd.spaceยท2hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
AI coding tools are perhaps our new terminal emulators
ghuntley.comยท8hยท
Discuss: Hacker News
๐Ÿ Homelab Archaeology
MMSearch-R1: Incentivizing LMMs to Search
arxiv.orgยท5h
๐Ÿ”BitFunnel
Understanding Prolly Tree Balance
dolthub.comยท9hยท
Discuss: Hacker News
๐ŸŒฒB-tree Variants
Kafka Fundamentals: kafka retention.ms
dev.toยท22hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
How Open Data Editor helps us embrace FAIR data principles
blog.okfn.orgยท1d
๐Ÿ”“Open Source Software
Data Has No Moat!
towardsdatascience.comยท1d
๐ŸบDatabase Archaeology
9 Nerdy Ways to SSH into a Server
adaptive.liveยท1hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
First sea-level records for coastal community protection
phys.orgยท15h
๐ŸงŠArctic Storage
Seeing is Believing? Mitigating OCR Hallucinations in Multimodal Large Language Models
arxiv.orgยท5h
๐Ÿค–Advanced OCR
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toยท11hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Divine Provenance
asimov.blogยท13hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Data Curation Matters: Model Collapse and Spurious Shift Performance Prediction from Training on Uncurated Text Embeddings
arxiv.orgยท2d
๐Ÿ—‚๏ธVector Databases
Loading...Loading more...
AboutBlogChangelogRoadmap