🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚡ Dependent Rust

Verification, Type-level Programming, Safety Proofs, Linear Types

Attack Surface Management: Why MSPs Don’t Need Another Tool
heimdalsecurity.com·1d
🔒WASM Capabilities
Performance Testing, Part 1: The Road to Continuous Performance Testing
tweag.io·16h
👁️System Observability
Certificate Transparency - Part 2 - Sunlight
ipng.ch·4d
🌳Archive Merkle Trees
Great Ideas in Theoretical Computer Science
ocw.mit.edu·18h·
Discuss: Hacker News
🧮Theoretical Computer Science
Show HN: USDA-linked nutrition API from messy inputs (CLI/Python/REST)
nutrition.avocavo.app·20h·
Discuss: Hacker News
📡RSS Automation
"Titan Quest 2" played: "Diablo" competitor, made in Germany
heise.de·1d
🕹️Retro Gaming
Kubeadm Join issue
reddit.com·14h·
Discuss: r/kubernetes
🕸️Network Topology
My brief overview of Cangjie Programming Language by Huawei
codeabbey.com·6d·
Discuss: Hacker News, r/programming
🔗Concatenative Programming
From crawlers to AI agents: why untangling the new AI-powered web takes an intent-based approach
techradar.com·10h
🎯Threat Hunting
[Media] silverfish - An easy way to set and get blocks in Minecraft worlds.
reddit.com·2d·
Discuss: r/rust
🦀Rust Macros
Robots are not that bad
dev.to·1d·
Discuss: DEV
📊Feed Optimization
How to Use LLMs for Powerful Automatic Evaluations
towardsdatascience.com·20h
🔗Constraint Handling
Deep QSAR for Enhanced Drug Candidate Prioritization via Multi-Objective Optimization
dev.to·10h·
Discuss: DEV
🔍Vector Forensics
Blending Imitation and Reinforcement Learning for Robust Policy Improvement
arxiv.org·2d
🔲Cellular Automata
GPT-5 vs. Sonnet: Complex Agentic Coding
elite-ai-assisted-coding.dev·6d·
Discuss: Hacker News
🦀Rust Macros
Automate AIOps with Amazon SageMaker Unified Studio projects, Part 1: Solution architecture
aws.amazon.com·1d
🏠Homelab Orchestration
Unlocking the Magic of Models: Customizing Use Cases with Retrieval-Augmented Generation (RAG)
dev.to·1d·
Discuss: DEV
📊Feed Optimization
Understanding Users' Privacy Perceptions Towards LLM's RAG-based Memory
arxiv.org·2d
💻Local LLMs
Autonomous Air-Ground Vehicle Operations Optimization in Hazardous Environments: A Multi-Armed Bandit Approach
arxiv.org·2d
🔲Cellular Automata
OpenSSH Enhances Security with Post-Quantum Cryptography
discoverbsd.com·3d
🐡OpenBSD
Loading...Loading more...
AboutBlogChangelogRoadmap