🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Feed Archaeology

RSS History, Syndication Evolution, Protocol Heritage, Web Standards

Why our website looks like an operating system
posthog.com·10h·
Discuss: Hacker News
📄PostScript
How to Avoid Knowledge Stagnation
marlonribunal.com·2d·
Discuss: Hacker News
🧠Personal Knowledge Base
Anonymity is dead and we’re all content now
theverge.com·12h·
Discuss: Hacker News
📰RSS Archaeology
Empromptu Unveils Vibecoding Platform for Building Enterprise-Class Apps
devops.com·1d
🌊Streaming Systems
All You Need Is SSH
wrongthink.link·1d·
Discuss: Lobsters, Hacker News
💿WORM Storage
Show HN: Oboe, a generalized AI-powered learning platform
news.ycombinator.com·14h·
Discuss: Hacker News
📼Cassette Hacking
Tech companies are stealing our books, music and films for AI. It’s brazen theft and must be stopped | Anna Funder and Julia Powles
theguardian.com·22h
🧲Magnetic Philosophy
The Untold Saga Of What Happened When DOGE Stormed Social Security
techdirt.com·8h
🎫Kerberos Attacks
New Android RAT uses Near Field Communication to automatically steal money from devices
techradar.com·14h
🕵️Vector Smuggling
Security Affairs newsletter Round 540 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·3d
🔓Hacking
Adaptive QoS Routing with Reinforcement Learning in 5G Cellular Networks
dev.to·2d·
Discuss: DEV
📡Network Calculus
Hyperspectral Mamba for Hyperspectral Object Tracking
arxiv.org·1h
🧠Machine Learning
AI-Powered Social Media Engagement Manager
dev.to·2d·
Discuss: DEV
⚖️Feed Ranking
The Majority is not always right: RL training for solution aggregation
arxiv.org·2d
🔗Parser Combinators
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification
arxiv.org·2d
🛡️Proof-Carrying Data
Gotta Forge 'Em All: Building the Pokémon Creator I Wish I Had as a Kid 🎨
dev.to·13h·
Discuss: DEV
📼Retro Games
Multi-EuP: The Multilingual European Parliament Dataset for Analysis of Bias in Information Retrieval
arxiv.org·2d
📊Multi-vector RAG
Crypto wallets targeted in widespread hack of open-source repos
reversinglabs.com·1d
🎫Kerberos Attacks
From Vision to Validation: A Theory- and Data-Driven Construction of a GCC-Specific AI Adoption Index
arxiv.org·2d
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
AIEQ: AI's Unfulfilled Promise
seekingalpha.com·1d
📡RSS
Loading...Loading more...
AboutBlogChangelogRoadmap