๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Data Provenance

Audit Trails, Lineage Tracking, Historical Metadata, Chain of Custody

We've pumped so much groundwater that we've nudged the Earth's spin
news.agu.orgยท14hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Dutch researchers use heartbeat detection to unmask deepfakes
computerweekly.comยท2dยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
The app I never launched
asad.pwยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Recommitting to our why, what, and how
blogs.microsoft.comยท2dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Total Body Disruption
en.wikipedia.orgยท1dยท
Discuss: Hacker News
๐ŸŒก๏ธArchive Thermodynamics
Accept the Software Update: Why It Can Ward Off Cybercriminals
hackernoon.comยท20h
๐Ÿ”“Hacking
Secure your supply chain with these 3 strategic steps
techradar.comยท4d
๐Ÿ”—Supply Chain
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
securityaffairs.comยท1d
๐Ÿ”“Hacking
What happened when Sam responded to a text most would delete
abc.net.auยท1d
๐ŸŽซKerberos Attacks
Eau no! Dior tells customers their data was swiped in cyber snafu
theregister.comยท2d
๐Ÿ”“Hacking
The Polymath Tool for All Your Audio and Document Needs
dev.toยท1dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Optimization of Grocery Shop Pricing
github.comยท11hยท
Discuss: DEV, Hacker News
๐Ÿ”ŒOperating system internals
How Apps and Your Phone Can Expose Your Life Without Permission
paloaltonetworks.comยท4d
๐Ÿ›กCybersecurity
FoundationDB: A Distributed Database That Canโ€™t Be Killed
thenewstack.ioยท1d
๐Ÿ›ก๏ธByzantine Fault Tolerance
LLMs remain vulnerable to "jailbreaking" through adversarial prompts
link.springer.comยท3dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
โšก Implementing Semantic Search (Vector Search) Using Amazon S3 Vectors
dev.toยท2dยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
Q&A: Snowflake Analytics Chief on Centralizing Data for AI
thenewstack.ioยท3d
๐ŸŒŠStream Processing
Transform Before You Query: A Privacy-Preserving Approach for Vector Retrieval with Embedding Space Alignment
arxiv.orgยท2d
๐ŸงฎVector Embeddings
Paper Notes - From Mind to Machine: The Rise of Manus AI as a Fully Autonomous Digital Agent
dev.toยท14hยท
Discuss: DEV
โš™๏ธTLA+
What Virtual Real Estate Prices Tell Us About Cryptocurrency Bubbles
hackernoon.comยท18h
๐Ÿ”BitFunnel
Loading...Loading more...
AboutBlogChangelogRoadmap