๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“Š Dependency Graphs

Build Systems, Package Analysis, Supply Chain, Security Auditing

Cofense Unveils Vision 3.0 with Sub-Minute Threat Containment Capabilities and Deeper Insights
cofense.comยท8h
๐ŸŽฏThreat Hunting
Single SMB host, multiple networks: need new solution
forum.proxmox.comยท1dยท
Discuss: r/homelab
๐Ÿ’ฟProxmox HA
How to Solve a Problem
henrikkarlsson.xyzยท1dยท
Discuss: Hacker News
โ„๏ธNordic Design Philosophy
Winding Down Olympia
obie.medium.comยท10hยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
The Internal Tooling Maturity Ladder
robbyonrails.comยท5dยท
Discuss: Hacker News, r/programming
๐Ÿ“ŸCLI Design
Generalized quantum Chernoff bound
arxiv.orgยท9h
โš›๏ธQuantum Channels
Boost Flutter App Performance with flutter_assets CLI
dev.toยท2hยท
Discuss: DEV
๐ŸบZIP Archaeology
Artificial intelligence (AI) techniques: a game-changer in Digital marketing for shop
arxiv.orgยท9h
๐ŸŒCultural Algorithms
NZ1: A minimalist, dependency-free data compression algorithm
github.comยท6dยท
Discuss: Hacker News
๐ŸŒŠStreaming Compression
SproutBench: A Benchmark for Safe and Ethical Large Language Models for Youth
arxiv.orgยท1d
๐ŸŒ€Brotli Internals
The Cost and Benefits of Developing an AI-Powered Smart Personal Assistant App
dev.toยท8hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Quantifying Early Star Formation Density Fluctuations via Bayesian Hyperparameter Inference
dev.toยท16hยท
Discuss: DEV
๐ŸงฎKolmogorov Bounds
Hyperdimensional Semantic Alignment via Learned Kernel Regression for Enhanced Knowledge Graph Triplet Extraction
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Grammar Induction
Adaptive EtherCAT Profile Management via Reinforcement Learning & Predictive Analytics
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
What are AI Agents?
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
How Beginners Can Use AI Without Becoming Dependent On It
dev.toยท17hยท
Discuss: DEV
๐Ÿ“Proof Assistants
Build a Real-World IROPS Re-accommodation Workflow with KaibanJS
dev.toยท5dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Unlocking Business Intelligence with Power BI
dev.toยท6hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems
dev.toยท16hยท
Discuss: DEV
๐Ÿ”’Language-based security
Automated Artifact Evaluation Through Multi-Modal Semantic Graph Analysis and Recursive Scoring
dev.toยท3dยท
Discuss: DEV
โšกProof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap