🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”€ EBCDIC Mining

Character Set Archaeology, Mainframe Data Recovery, Legacy Text Processing

Where Did CP852 Come From Again?
os2museum.comΒ·2h
🍎Apple II Heritage
PMM support for na_game_tool
codecs.multimedia.cxΒ·1h
πŸ•ΈοΈWASM Archives
How to Prove That An Email Was Received
metaspike.comΒ·1d
πŸ“„Document Digitization
ESET Threat Report H1 2025
welivesecurity.comΒ·1d
🎯Threat Hunting
The "Bath Tub" Maintenance Curve Explained
accendoreliability.comΒ·4hΒ·
Discuss: Hacker News
🌑️Preservation Entropy
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”²Cellular Automata
Show HN: Towards agentic Graph RAG: Enhancing graph retrieval with vector search
blog.kuzudb.comΒ·1dΒ·
Discuss: Hacker News
πŸ“ŠGraph Databases
The Backtester's Edge: How Code and AI Transform Your Strategy Game
fractiz.comΒ·2dΒ·
Discuss: Hacker News
⚑Proof Automation
Economic Cycle Synchronization with Dynamic Time Warping
towardsdatascience.comΒ·1d
πŸ“ˆTime Series
C++ Seeding Surprises (2015)
pcg-random.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”’Bitwise Algorithms
I asked AI to recreate my classic 1980s platform game, and it failed miserably, but I'm still impressed by the tech
techradar.comΒ·6h
πŸ“ΌRetro Games
Bcachefs may be headed out of the kernel
lwn.netΒ·3hΒ·
Discuss: Hacker News
πŸ’ΏZFS Archaeology
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
A Multi-Pass Large Language Model Framework for Precise and Efficient Radiology Report Error Detection
arxiv.orgΒ·1d
βœ…Format Verification
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgΒ·3d
πŸ”—Hash Chains
Advancements in Computer Science Learning: A Synthesis of Recent Research in AI and Machine Learning
dev.toΒ·9hΒ·
Discuss: DEV
🧠Machine Learning
Why We Chose Rust For Spin
dev.toΒ·2hΒ·
Discuss: DEV
πŸ¦€Rust Macros
How Geopolitical Tensions Are Shaping Cyber Warfare
darkreading.comΒ·1d
🎯Threat Hunting
From Beginner to Clean Coder: A Junior Developer's Journey
dev.toΒ·1hΒ·
Discuss: DEV
πŸ”—Concatenative Programming
Language Modeling by Language Models
arxiv.orgΒ·1d
πŸ€–Grammar Induction
Loading...Loading more...
AboutBlogChangelogRoadmap