šŸæļø ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
šŸ”§ Error Correction

Reed-Solomon, BCH Codes, Hamming Distance, Forward Error Correction

TEAC founded in 1953, sort of
dfarq.homeip.netĀ·13h
šŸ’¾vintage computing
DropSum 1.2 is more flexible in handling text
eclecticlight.coĀ·1d
šŸ” Terminal Fonts
AMD details how it built a product line-up with just two RDNA 4 dies — Flexible design and asymmetric harvesting enables production of multiple models without n...
tomshardware.comĀ·12h
šŸ–„ļøTerminal Renaissance
Friday 29 August, 2025
memex.naughtons.orgĀ·52m
šŸ“–Nordic Typography
Get Ahead of the HIPAA Security Rule Update With Secure Workload
blogs.cisco.comĀ·1d
šŸŽÆThreat Hunting
TransUnion Says Hackers Stole 4.4 Million Customers' Personal Information
it.slashdot.orgĀ·4h
šŸ”¤EBCDIC Privacy
Rendering an ASCII game in real-time with AI (100ms latency)
blog.jeffschomay.comĀ·11hĀ·
Discuss: Hacker News
šŸ“ŸTerminal Physics
Waveform-controlled field synthesis of 100 Terawatt sub-2-cycle pulses
nature.comĀ·11hĀ·
Discuss: Hacker News
šŸ”¬Optical Physics
Agentic Metaflow
outerbounds.comĀ·1dĀ·
Discuss: Hacker News
🌊Streaming Systems
LLMs for Software Developers (notes from my talk at NWRUG)
theartandscienceofruby.comĀ·1dĀ·
Discuss: Lobsters, Hacker News
āš”ļøLean Tactics
Gaps in California Privacy Law: Half of Data Brokers Ignore Requests
darkreading.comĀ·1d
šŸ”¤EBCDIC Privacy
Reliable Weak-to-Strong Monitoring of LLM Agents
arxiv.orgĀ·20h
šŸŽÆThreat Hunting
Nil Pointer Panic at 3 AM: Choosing the Right Go Database Tool to Save Your Sleep
dev.toĀ·2dĀ·
Discuss: DEV
🧩SQLite Extensions
šŸŒ The Journey of Data: From Raw Logs to Insights
dev.toĀ·8hĀ·
Discuss: DEV
šŸ”—Data Provenance
Formal verification effort for the ABDK Math 64.64 library using echidna/hevm
github.comĀ·3dĀ·
Discuss: Hacker News
āœ…Format Verification
Deciphering NLR Decoy Domain Dynamics via Multi-scale Bayesian Network Inference
dev.toĀ·3hĀ·
Discuss: DEV
🧮Kolmogorov Complexity
School of Reward Hacks: Hacking harmless tasks generalizes to misaligned behavior in LLMs
arxiv.orgĀ·2d
šŸ”²Cellular Automata
How I’d scale a side project to 1 million users (without melting my server)
dev.toĀ·2hĀ·
Discuss: DEV
šŸ”—Proxmox Clustering
WoW: A Window-to-Window Incremental Index for Range-Filtering Approximate Nearest Neighbor Search
arxiv.orgĀ·1d
šŸ—‚ļøVector Databases
Memorization in Graph Neural Networks
arxiv.orgĀ·20h
šŸ•øļøGraph Embeddings
Loading...Loading more...
AboutBlogChangelogRoadmap