🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Feed Archaeology

RSS History, Syndication Evolution, Protocol Heritage, Web Standards

Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.com·1d
👁️Perceptual Hashing
Beyond the Checkbox: How Backblaze’s SOC 2 Type 2 Certification Secures Your Cloud Data
backblaze.com·13h
✅Archive Fixity
The Art of Saying “No” to Shiny New Tools
brajeshwar.com·5h
🔄Language Evolution
Bun JS toolkit adds MySQL driver, secrets API, YAML, and more
theregister.com·11h
🔄Sync Engine
Episode 100
reloadin.net·2d·
Discuss: Hacker News
📡Network Protocol Design
I Built My Own Chat Instead of Relying on Jivo or LiveChat: Here's How
hackernoon.com·16h
⚡gRPC
LLMs for Software Developers (notes from my talk at NWRUG)
theartandscienceofruby.com·17h·
Discuss: Lobsters, Hacker News
⚔️Lean Tactics
Security Flaws in the WebMonetization Site
shkspr.mobi·1d·
Discuss: Hacker News, shkspr.mobi
📡Feed Security
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
arxiv.org·1h
🛡️ARM TrustZone
Quantization Robustness to Input Degradations for Object Detection
arxiv.org·1h
📊Quantization
I built a production app in a week by managing a swarm of 20 AI agents
zachwills.net·12h·
Discuss: Hacker News
🤖Network Automation
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.org·1d
🔍Vector Forensics
A Dynamic Approach to Collaborative Document Writing
arxiv.org·2d
🔗Parser Combinators
Attention2Probability: Attention-Driven Terminology Probability Estimation for Robust Speech-to-Text System
arxiv.org·1d
🎙️Whisper
HTMS Stream Async HTML, Stay SEO-Friendly
github.com·5d·
Discuss: Hacker News
📰Feed Readers
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·2d
🎯Content Recommendation
Reproducible LLM Benchmarking: GPT-5 vs Grok-4 with Promptfoo
dev.to·1d·
Discuss: DEV
⚡gRPC
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.org·1d
🔒Language-based security
Data-Efficient Symbolic Regression via Foundation Model Distillation
arxiv.org·1h
✨Effect Handlers
AI-Powered Detection of Inappropriate Language in Medical School Curricula
arxiv.org·1h
🎵Audio ML
Loading...Loading more...
AboutBlogChangelogRoadmap