🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
△ Delta Compression

Version Control, Diff Algorithms, Incremental Backups, Change Tracking

Amped DVRConv and Engine Update 38103
blog.ampedsoftware.com·1d
🎬Video Codecs
Tracking Activity on your App Turn data into smart decisions and valuable insights
blog.codeminer42.com·3h
📊Feed Optimization
Go at american express today
americanexpress.io·23h
🔌Interface Evolution
Stop the Next Breach: Cyber Graphs for Post-Incident Network Monitoring
memgraph.com·1d·
Discuss: Hacker News
🎯Threat Hunting
Mitigating the risks of package hallucination and 'slopsquatting'
techradar.com·1d
🔓Hacking
Machine Learning Fundamentals: dimensionality reduction example
dev.to·1d·
Discuss: DEV
📐Vector Dimensionality
What people said about an OpenZFS bug
despairlabs.com·1d·
Discuss: Lobsters, Hacker News
🔒Type Safety
Solving the Context Rot Problem for Coding Agents
install.md·1d·
Discuss: Hacker News
🌳Incremental Parsing
Self-hosting CI runners is a trap
shipfox.io·8h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Stop Fighting Image Formats: A Developer's Guide to Streamlined Image Processing
dev.to·1d·
Discuss: DEV
📸PNG Optimization
Comparing Claude Code vs OpenCode (and testing different models)
andreagrandi.it·22h·
Discuss: Hacker News
📜Proof Carrying Code
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.org·18h
🔐Quantum Security
Ilion Framework: A Public Layer for Semantic Alignment with Truth
zenodo.org·4d·
Discuss: Hacker News
💾Binary Linguistics
A PhD's Apology
cappadokes.github.io·1d·
Discuss: Hacker News
🧮Theoretical Computer Science
Automated Function ID Database Generation in Ghidra on Windows
blog.mantrainfosec.com·10h·
Discuss: Hacker News
🔓Decompilation
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.org·18h
⧗Information Bottleneck
Vibe Coding with AI: Ensuring User Needs Are Met
kamil.chm.ski·8h·
Discuss: Hacker News
🚀Indie Hacking
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·1d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Compressed data structures for Heegaard splittings
arxiv.org·1d
🕳️Persistent Homology
Nextflow: System for creating scalable, portable, reproducible workflows
github.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap