🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✈️ Datasaab Archaeology

Swedish Mainframes, D2 Computer, Nordic Computing Heritage, SAAB Technology

External Secrets Operator at a Turning Point
externalsecrets.com·1d·
Discuss: Hacker News
🔓Open Source Software
Playing With Fire - Are Russia's hybrid attacks the new European war?
investigations.news-exchange.ebu.ch·1d·
Discuss: Hacker News
🔍Polish Cryptanalysis
Hackers breach HR firm Workday - is it the latest Salesforce CRM attack victim?
techradar.com·1d
🔓Hacking
Using AI to transcribe YT videos into structured notes
dev.to·2d·
Discuss: DEV
📺yt-dlp
A Perfectly Truthful Calibration Measure
arxiv.org·1d
🎯Arithmetic Coding Theory
CTRL Your Shift: Clustered Transfer Residual Learning for Many Small Datasets
arxiv.org·2d
📊Learned Metrics
PersonaTwin: A Multi-Tier Prompt Conditioning Framework for Generating and Evaluating Personalized Digital Twins
arxiv.org·2d
👤Search Personalization
INFNet: A Task-aware Information Flow Network for Large-Scale Recommendation Systems
arxiv.org·2d
🧭Content Discovery
Internet-wide Vulnerability Enables Giant DDoS Attacks
darkreading.com·1d
🔓Hacking
Intergenerational Support for Deepfake Scams Targeting Older Adults
arxiv.org·2d
⏳Time Capsule Networks
Approximating the universal thermal climate index using sparse regression with orthogonal polynomials
arxiv.org·2d
📐Error Bounds
Training Machine Learning Models on Human Spatio-temporal Mobility Data: An Experimental Study [Experiment Paper]
arxiv.org·1d
📐Vector Similarity
Apple Card Turns Six With Big Change Ahead
macrumors.com·14h
🍎Apple Computing
Vibe Coding: Building the Brooke & Maisy E-Commerce Store with Rails and Kilo Code
dev.to·3d·
Discuss: DEV
🌀Brotli Internals
GHC Developer Blog: GHC 9.10.3-rc4 is now available
haskell.org·2d
🔗Functional Compilers
SafeConstellations: Steering LLM Safety to Reduce Over-Refusals Through Task-Specific Trajectory
arxiv.org·2d
✨Effect Handlers
Beyond Solving Math Quiz: Evaluating the Ability of Large Reasoning Models to Ask for Information
arxiv.org·2d
🧮SMT Solvers
When the insider Is the adversary: North Korea’s remote work espionage campaign
techradar.com·2d
🔓Hacking
Structural insight: Bypassing no-go theorems
fexpr.blogspot.com·1d
🔲Proof Irrelevance
Game-Theoretic and Reinforcement Learning-Based Cluster Head Selection for Energy-Efficient Wireless Sensor Network
arxiv.org·1d
🕸️Network Topology
Loading...Loading more...
AboutBlogChangelogRoadmap