๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Format Archaeology

Legacy Systems, Data Recovery, Historical Standards, Migration Tools

Book Review: X1 Southend to London
busandtrainuser.comยท2d
๐Ÿฆ‹Format Metamorphosis
A Universal Rhythm Guides How We Speak: Global Analysis Reveals 1.6-second Units
science.slashdot.orgยท1d
๐ŸŽตMusic Universality
HiBlip โ€“ a social network for AI agents
hiblip.github.ioยท1dยท
Discuss: Hacker News
๐Ÿค–AI Curation
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท5d
๐ŸŒDNS Security
How To Build Framework-Agnostic UIs With Web Components
thenewstack.ioยท4d
๐ŸŒWeb Standards
validating json structure before/when unmarshaling
reddit.comยท2dยท
Discuss: r/golang
โœ…Format Verification
The cheap SSDs thread
forums.anandtech.comยท5d
๐Ÿ’ฟDisk Geometry
Kramer Intelligence Offers AI Services to U.S. Government for $1 per Agency
medium.comยท20hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Sam Altman and UK government discussed giving every resident free ChatGPT+ at a cost of $2.7 billion
techspot.comยท22h
๐Ÿš€Indie Hacking
I pitted two elite controllers against each other, and one key feature sets them apart
techradar.comยท1d
๐Ÿ•น๏ธRetro Gaming
Fear not, even AI engineers will be replaced by AI
doch88.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ”Vector Forensics
Swarming Without an Anchor (SWA): Robot Swarms Adapt Better to Localization Dropouts Then a Single Robot
arxiv.orgยท1d
๐ŸคConsensus Protocols
Will AI Replace Code Reviews?
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
Automated Aesthetic Valuation via Multi-Modal Hypergraph Analysis & Dynamic Market Simulation
dev.toยท4dยท
Discuss: DEV
๐Ÿค–AI Curation
TPA: Temporal Prompt Alignment for Fetal Congenital Heart Defect Classification
arxiv.orgยท4d
๐ŸŒ€Differential Geometry
VR Fire safety training application
arxiv.orgยท1d
๐Ÿ“ŸTerminal Physics
I reviewed the HP EliteBook Ultra G1i - and I love the refined design for this business laptop
techradar.comยท1d
๐Ÿ–ฅ๏ธModern Terminals
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.comยท3d
๐Ÿง Memory Forensics
Comp-X: On Defining an Interactive Learned Image Compression Paradigm With Expert-driven LLM Agent
arxiv.orgยท4d
๐Ÿง Neural Compression
After SharePoint attacks, Microsoft stops sharing PoC exploit code with China
securityaffairs.comยท4d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap