🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“œ Family History Data

GEDCOM Standards, Legacy Formats, Digitization Workflows, Privacy Protection

Intel Atom C3758R-powered Nexcom DFA 1163 uCPE supports 10GbE, WiFi 6, 4G LTE, 5G, and NTN connectivity
cnx-software.comΒ·1d
πŸ‡³πŸ‡±Dutch Computing
The Future of Database Activity Monitoring Is Here
optiv.comΒ·2d
πŸ—„οΈDatabase Internals
Building Hyperforce Service Mesh: Blast Radius Reduction, Scale Optimization, and Open Source Innovation
engineering.salesforce.comΒ·2d
πŸ•ΈοΈMesh Networking
Getting the most out of a request in Warp
warp.devΒ·2d
🌊Streaming Systems
What are Federal Reserve swap lines?
brookings.eduΒ·16hΒ·
Discuss: Hacker News
⏳Time Capsule Networks
How the Myth of the Coequal Branches Became the Norm
aei.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”Archive Semantics
European space tech has data to sell β€” but where are the buyers?
thenextweb.comΒ·1dΒ·
Discuss: Hacker News
πŸ“‘RSS Syndication
Transition from legacy (Google Duo) calls to the new Meet call experience
support.google.comΒ·5dΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Handling PII in customer-facing AI chatbots: mask before sending to LLM
hoverbot.aiΒ·5dΒ·
Discuss: Hacker News
🌐DNS Security
AMD phases out B650 chipset as B850 becomes new mainstream AM5 platform
techspot.comΒ·10h
🧲RISC-V Preservation
Make LLMs supportive, not sycophantic
chrisbarber.coΒ·12hΒ·
Discuss: Hacker News
🎯Gradual Typing
US regulator reminds tech companies of data protection abroad
heise.deΒ·1d
πŸ”€EBCDIC Privacy
Developer's block
underlap.orgΒ·2hΒ·
Discuss: Lobsters, Hacker News
πŸ”©Systems Programming
Scientists Discover Bizarre Armored β€œMonster” Stalked the Forests of Prehistoric Utah
scitechdaily.comΒ·2d
🦴Database Paleontology
Are online telehealth sites legit? The government warns of an 'increasing risk'
abc.net.auΒ·2d
πŸ–₯️Self-hosted Infrastructure
Building a Production-Ready Soft Delete System in Django (with Custom User Model)
dev.toΒ·3dΒ·
Discuss: DEV
πŸ’ΎPersistence Strategies
Update: We're Building an Open-Sourced, Privacy-Focused, Free PDF WebApp:)
news.ycombinator.comΒ·3dΒ·
Discuss: Hacker News
πŸ“„PostScript
PersRM-R1: Enhance Personalized Reward Modeling with Reinforcement Learning
arxiv.orgΒ·2d
πŸ‘€Search Personalization
Gravimetric Anomaly Mapping for Subterranean Cave Network Characterization via Quantum Sensor Arrays
dev.toΒ·1dΒ·
Discuss: DEV
βš›οΈQuantum Tape
How Architectural Controls Help Can Fill the AI Security Gap
darkreading.comΒ·2d
πŸ”’Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap