🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏛️ Eastern European Computing

Soviet BESM, Polish Elwro, Czech MIR, Socialist Hardware, Cold War Technology

Machine that aided moon landing acquired by Scots museum as anniversary nears
the-independent.com·22h
🇬🇧British Computing
Running NetBSD on my Amiga 4000
sandervanderburg.blogspot.com·9h·
Discuss: Hacker News
🔌Operating system internals
After a couple of weeks testing the Lenovo Legion Pro 7i, I found its performance and screen impressive, but its battery life? Not so much
techradar.com·4h
🖥️Modern Terminals
Show HN: Rastion – Autonomous Monitoring Systems
rastion.com·16h·
Discuss: Hacker News
⚙️Batch Processing
Ellen Ullman’s “Close to the Machine.”
doctorow.medium.com·1d
🖥️Terminal Renaissance
4 Chinese APTs Attack Taiwan's Semiconductor Industry
darkreading.com·8h
🇨🇳Chinese Computing
Show HN: I built a self-learning AI without an LLM – memory, reflection
news.ycombinator.com·1d·
Discuss: Hacker News
🎙️Whisper
Multi-Class-Token Transformer for Multitask Self-supervised Music Information Retrieval
arxiv.org·5h
🎧Learned Audio
WaveletInception Networks for Drive-by Vibration-Based Infrastructure Health Monitoring
arxiv.org·5h
🧠Machine Learning
Reflecting on PLDI 2025
people.csail.mit.edu·4d·
Discuss: Hacker News
🌐Protocol Synthesis
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
theregister.com·21h·
Discuss: Hacker News
🔐Quantum Security
Tunneling magnetoresistance in altermagnetic RuO₂-based magnetic tunnel junctions
phys.org·19h
🧲Magnetic Tape Physics
Day 28/100: List Comprehensions in Python
dev.to·6h·
Discuss: DEV
📝Concrete Syntax
Building an AI-Powered Image Search Engine with Daft.ai
dev.to·2d·
Discuss: DEV
🌀Brotli Internals
DHH: Future of Programming, AI, Ruby on Rails, Productivity and Parenting
lexfridman.com·3d·
Discuss: Hacker News
💾vintage computing
The Imitation Game: Turing Machine Imitator is Length Generalizable Reasoner
arxiv.org·5h
🧮Kolmogorov Complexity
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.org·1d
🕵️Vector Smuggling
AI and misinformation are supercharging the risk of nuclear war
nature.com·14h
🔲Cellular Automata
Canonical and ESWIN announces EBC77 RISC-V SBC with Ubuntu 24.04 support
cnx-software.com·1d
🔌Operating system internals
FSM Library for Embedded C Projects
hackster.io·4d
🦀Embedded Rust
Loading...Loading more...
AboutBlogChangelogRoadmap