๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Error Correction

Reed-Solomon, BCH Codes, Hamming Distance, Forward Error Correction

Chess: Gukesh wins impressively on Silk Road as Grand Swiss starts in Samarkand
theguardian.comยท17h
๐Ÿ”Soviet Cryptography
DSvClient 0.6 โ€“ Broadcom ready and bug fixes
michaelryom.dkยท2d
๐ŸŽž๏ธMKV Internals
AI Data Centers Near Tax Break With $165 Billion of Phantom Debt
bloomberg.comยท1dยท
Discuss: Hacker News
๐ŸŒŠCBOR Streaming
EventSourcingDB 1.1 offers more flexible consistency control and signed events
heise.deยท2d
๐ŸŒŠStreaming Databases
What are Error Budgets? A Guide to Managing Reliability
oneuptime.comยท2dยท
Discuss: Hacker News, r/devops, r/webdev
๐Ÿ›ก๏ธError Boundaries
JSON Streaming in OpenAPI v3.2.0
bump.shยท3dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
I visit Las Vegas several times a year. Here are 6 things tourists should definitely skip — and what to do instead.
businessinsider.comยท9h
โญAwesome lists
Antibody capture system drives specific delivery of mRNA-lipid nanoparticles
nature.comยท1dยท
Discuss: Hacker News
๐Ÿ“„Document Digitization
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
a13xp0p0v.github.ioยท3dยท
Discuss: Lobsters, Hacker News, Hacker News
๐Ÿฆ€Embedded Rust
[P] I Was Wrong About Complex ML Solutions - Gower Distance Beat My UMAP Approach
reddit.comยท11hยท
Discuss: r/MachineLearning
๐Ÿ—‚๏ธVector Databases
How to Discover the Binary System as a Child โ€ข Simon Peyton Jones & Chelsea Troy โ€ข GOTO 2025
youtube.comยท4d
โš”๏ธLean Tactics
๐Ÿ“š My Python Roadmap Journey #3 & #4 - Data Structures & Algorithms
dev.toยท2dยท
Discuss: DEV
๐ŸŒ€Brotli Dictionary
Cryogenic Spray Drying Optimization via Multi-Modal Data Fusion and Bayesian Hyperparameter Tuning
dev.toยท1dยท
Discuss: DEV
โ˜•Precision Brewing
Why 'Clean Code' Is Harder Than It Sounds
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
3 ways to detect iCloud Private Relay traffic and prevent fraud
fingerprint.comยท3d
๐Ÿ•ต๏ธNetwork Forensics
Meta-Policy Reflexion: Reusable Reflective Memory and Rule Admissibility for Resource-Efficient LLM Agent
arxiv.orgยท20h
๐Ÿ“Linear Logic
Synopsys adds generative AI for chip development with Synopsys.ai Copilot design software
tomshardware.comยท6h
๐Ÿ–ฅ๏ธModern Terminals
China-aligned crew poisons Windows servers to manipulate Google results
theregister.comยท1d
๐ŸŽซKerberos Exploitation
DoubleVerify Holdings, Inc. (DV) Presents At Citi's 2025 Global Technology, Media And Telecommunications Conference Transcript
seekingalpha.comยท8h
๐Ÿ”„Format Migration
Awesome AI Agent Frameworks
github.comยท16hยท
Discuss: Hacker News
โšกProof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap