๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“Š Dependency Graphs

Build Systems, Package Analysis, Supply Chain, Security Auditing

Build This Sturdy Steel Wiener Dog Boot Scraper
popularmechanics.comยท1d
๐Ÿ› ๏ธGreaseweazle
Interactive Infrastructure as Code Tool Selection Guide
blackmoreops.comยท4d
๐Ÿ Homelab Orchestration
I'm a software engineer who spent nearly 7 years at Twitter before joining OpenAI. Here's how I got hired and why I love it.
businessinsider.comยท8h
๐Ÿ”ŒInterface Evolution
Leveraging Malware Sandboxes for Threat Analysis: How They Work, What They Reveal โ€” Decision-Making Processes
cyberwarhead.comยท2d
๐Ÿฆ Malware Analysis
Preserving legacy code with Software Heritage: A tutorial
softwareheritage.orgยท3d
๐Ÿ”„Archive Workflows
Fragmented security: the hidden threat undermining your cyber defenses
techradar.comยท2d
๐Ÿ”“Hacking
Why financial services choose single-tenant SaaS
about.gitlab.comยท2d
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Golang Concurrency: How to use Mutexes
cookie.engineerยท1h
๐Ÿ‘‘Dependent Haskell
Sandboxing AI-Generated Code: Why We Moved from WebR to AWS Lambda
quesma.comยท4dยท
Discuss: Hacker News, r/programming
๐Ÿ›ก๏ธWASM Sandboxing
Enhancing PDC ์‚ฐํ™” Catalysis via Dynamic Algorithm Selection with Bayesian Optimization
dev.toยท17hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Quantifying Collective Cognitive Load Impact on Community Resilience Through Agent-Based Modeling and Sentiment Analysis
dev.toยท22hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Advanced Plasma Etch Process Optimization via Dynamic Parameter Mapping and Bayesian Reinforcement Learning
dev.toยท12hยท
Discuss: DEV
โ˜•Precision Brewing
MCP Elicitation: Human-in-the-Loop for MCP Servers
dev.toยท2dยท
Discuss: DEV
โšกgRPC
From Code to Cloud: A Three-Act Playbook for Enterprise AI Transformation
dev.toยท2dยท
Discuss: DEV
โšกSMT Integration
Comparison of Generic Container Libraries for C
github.comยท3dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Self-Assembling RNA Compartments: Predictive Modeling of Phase Diagram Dynamics for Targeted Delivery
dev.toยท3hยท
Discuss: DEV
๐Ÿ’ŽInformation Crystallography
Introducing Amazon Bedrock AgentCore Identity: Securing agentic AI at scale
aws.amazon.comยท1d
๐Ÿ”PKI Archaeology
Automated Design Space Exploration for Hypersonic Vehicle Aerodynamic Optimization via Constrained Bayesian Optimization
dev.toยท13hยท
Discuss: DEV
๐ŸŒ€Differential Geometry
Detecting Untargeted Attacks and Mitigating Unreliable Updates in Federated Learning for Underground Mining Operations
arxiv.orgยท1d
๐ŸŒWARC Mining
Software Engineering Laws - Time & Estimation
leadership.gardenยท2d
โš™๏ธProof Engineering
Loading...Loading more...
AboutBlogChangelogRoadmap