๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—œ๏ธ LZSS Variants

Sliding Window, Dictionary Coding, Text Compression, LZ77 Extensions

Someone Is Building an Encrypted Chat for Bluesky, and You Can Sign Up to Try It
lifehacker.comยท11h
๐Ÿš€Indie Hacking
Gloom and Despair -- LaTeX Edition
slott56.github.ioยท10h
๐Ÿ“„PostScript
Achieving actually full disk encryption of UEFI ESP at rest with TCG OPAL, FIPS, LUKS
blog.surgut.co.ukยท1dยท
Discuss: blog.surgut.co.uk
๐Ÿ”’Secure Boot
Code listings with nice line wrapping and line numbers from plain CSS | Home
jaseg.deยท1d
๐Ÿ–‹Typography
Google Search AI Mode
search.googleยท12hยท
Discuss: Hacker News
๐Ÿ—œ๏ธLZW Variants
Raspberry Pi RP2350 A4 stepping fixes E9 GPIO Erratum, glitching bugs, introduces 2MB flash variants
cnx-software.comยท11hยท
Discuss: Lobsters, Hacker News
๐Ÿ”RISC-V Cryptography
Printing a Book at Home with Minimal Equipment
huijzer.xyzยท9hยท
Discuss: Hacker News
๐Ÿ“•Bookbinding
7 Must-Know Machine Learning Algorithms Explained in 10 Minutes
kdnuggets.comยท1d
๐Ÿง Machine Learning
Show HN: CineWan โ€“ video generation platform powered by Wan2.2 AI model
cinewan.netยท8hยท
Discuss: Hacker News
๐ŸŽฌVideo Codecs
When Do I Need to Use an LLM?
kdnuggets.comยท10h
๐Ÿ’ปLocal LLMs
Data Privacy Challenges in Open MCP Architectures
hackernoon.comยท8h
๐Ÿ”’WASM Capabilities
Tetris in a Single Line of Code
hackaday.comยท13h
๐ŸŽฎVintage Gaming
Show HN: SQLite-vector โ€“ Vector search extension for SQLite (no index, 30MB RAM)
github.comยท1dยท
Discuss: Hacker News
๐Ÿ’พSQLite
Quaternion-Based Robust PCA for Efficient Moving Target Detection and Background Recovery in Color Videos
arxiv.orgยท20h
๐ŸŒ€Riemannian Computing
Python OpenAI API create Pinecone embeddings from PDF documents and RAG examples
github.comยท1dยท
Discuss: Hacker News
โšกProof Automation
LSFDNet: A Single-Stage Fusion and Detection Network for Ships Using SWIR and LWIR
arxiv.orgยท20h
๐Ÿค–Advanced OCR
Why I Like Go
dev.toยท23hยท
Discuss: DEV
๐Ÿ”—Concatenative Programming
Nimble 'Gunra' Ransomware Evolves With Linux Variant
darkreading.comยท4h
๐ŸŒณArchive Merkle Trees
Top 10 Secure Coding Tactics to Prevent Data Breaches in On-Demand Apps (2025 Dev Guide)
dev.toยท12hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
FaRMamba: Frequency-based learning and Reconstruction aided Mamba for Medical Segmentation
arxiv.orgยท20h
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap