🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
βœ… Formal Methods

TLA+, Model Checking, Coq, Theorem Proving, Specification Languages

From Physical Archives to Digital Preservation: Reflecting on a Forty-Year Transformation
dpconline.orgΒ·15h
🌐Archive Networks
<p>πŸ”— <a href="https://manuelmoreale.com/on-em-dashes">Manuel Moreale: On em dashes</a></p>
lmika.orgΒ·1h
πŸ–‹Typography
These Two New Features Cement Google’s NotebookLM As One of My Favorite Study Apps
lifehacker.comΒ·6h
🌱Personal Wikis
Postgres internals deep dive: Process Architecture
enterprisedb.comΒ·32mΒ·
Discuss: Hacker News
πŸ—„οΈPostgreSQL WAL
NIST Revises Security & Privacy Control Catalog for Software Updates & Patches
nist.govΒ·12hΒ·
Discuss: Hacker News
πŸ”€EBCDIC Privacy
Fundamentals of Wireless Communication
web.stanford.eduΒ·3dΒ·
Discuss: Hacker News
ℹ️Information Theory
Can researchers stop AI making up citations?
nature.comΒ·2dΒ·
Discuss: Hacker News
πŸ’»Local LLMs
Under the Hood of Fuzzy Search: Building a Search Engine 15 times fuzzier than Lucene
andrewjsaid.comΒ·4dΒ·
Discuss: Hacker News, r/programming
🎯Automata theory
Attackers hijacked popular NPM packages to replace crypto wallet addresses
exaforce.comΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Hierarchical Reasoning Model assembly manual for toddlers
yacinemahdid.comΒ·1dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
Optimizing AI Inference on Non-GPU Architectures by Rajalakshmi Srinivasaraghavan
hackernoon.comΒ·1d
⚑CPU Microarchitecture
Writing Code Is Easy. Reading It Isn't
idiallo.comΒ·2dΒ·
Discuss: Hacker News, r/programming
πŸ“Code Metrics
Is Your Training Data Representative? A Guide to Checking with PSI in Python
towardsdatascience.comΒ·2h
πŸ“ˆEntropy Estimation
πŸš€ Looking for Feedback on ClearWork: Real-World Process Mapping, Future-State Design & Agentic Workflows
dev.toΒ·4hΒ·
Discuss: DEV
🌊Stream Processing
AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scambaiting by Leveraging LLMs and Federated Learning
arxiv.orgΒ·1d
🀐Secure Multiparty
Exploring approaches to computational representation and classification of user-generated meal logs
arxiv.orgΒ·1d
πŸŽ›οΈFeed Filtering
Built-in Runtime Security for Containers
blog.qualys.comΒ·1d
πŸ“¦Container Security
Gin framework architecture visualized
reddit.comΒ·9hΒ·
Discuss: r/golang
πŸ”ŒInterface Evolution
Tracking AI system performance using AI Evaluation Reports
dev.toΒ·1dΒ·
Discuss: DEV
πŸ‘οΈSystem Observability
First Impressions with Amazon Bedrock AgentCore
dev.toΒ·2hΒ·
Discuss: DEV
🏠Homelab Orchestration
Loading...Loading more...
AboutBlogChangelogRoadmap