๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ Linear Logic

Resource Awareness, Session Types, Proof Nets, Substructural Logic

SLAPPing Back: How Greenpeace v Energy Transfer Could Curb the Threat of Abusive Litigation
europeanlawblog.euยท13h
โš–๏ธArchive Ethics
Piracy Shield Study Reveals Massive Overblocking & Collateral Damage
torrentfreak.comยท11hยท
Discuss: r/Piracy
๐Ÿดโ€โ˜ ๏ธPiracy
The many myths about the Chinese typewriter
languagelog.ldc.upenn.eduยท19h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
A Guide to Creative Automation with CE.SDK & Javascript
img.lyยท3d
๐Ÿค–Archive Automation
Homes generate power for the grid โ€“ and residents don't worry about blackouts
cbc.caยท23hยท
Discuss: Hacker News
๐Ÿ Home Automation
The Guardian view on the โ€˜twinโ€™ Vermeers: how to spot a masterpiece | Editorial
theguardian.comยท1d
๐Ÿ’งManuscript Watermarks
PlayOJO Welcome Bonus: PlayOJO 80 Free Spins Casino Bonus
the-independent.comยท1d
๐ŸŽซKerberos Attacks
Will a pensions raid stop young people from saving?
the-independent.comยท3h
๐Ÿ Personal Archives
Asymmetric Linearizable Local Reads
muratbuffalo.blogspot.comยท6dยท
Discuss: Hacker News
๐Ÿ›ก๏ธByzantine Fault Tolerance
Data Cleaning in Data Mining: Why Itโ€™s the First Step in Analytics
dev.toยท13hยท
Discuss: DEV
๐Ÿ”คEBCDIC Mining
Raspberry Pi Not Booting: How to Repair Micro SD Card
linuxblog.ioยท7h
๐ŸŽฎCartridge Archaeology
<p>๐Ÿ”— <a href="http://scripting.com/davenet/1995/09/03/wemakeshittysoftware.html">Dave Winer: We Make Shitty Software</a></p>
lmika.orgยท3d
๐Ÿš€Indie Hacking
AMD GPUs for deep learning and AI
dev.toยท1dยท
Discuss: DEV
๐Ÿ–ฅ๏ธTerminal Renaissance
VX-NOVA.ฮฉ1: A Symbolic AI Engine That Patches Code Without Any Models
github.comยท4dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
The Birth of Python
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปProgramming languages
Banishing LLM Hallucinations Requires Rethinking Generalization
arxiv.orgยท4d
๐Ÿ’ปLocal LLMs
From image Upload to Workspace Takeover: Deconstructing a Critical Stored XSS Attack
infosecwriteups.comยท3d
๐Ÿ”“Hacking
PTC Therapeutics, Inc. (PTCT) Presents At Morgan Stanley 23rd Annual Global Healthcare Conference (Transcript)
seekingalpha.comยท2h
๐Ÿ“‹PREMIS Events
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan
dev.toยท5dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Dyne Therapeutics, Inc. (DYN) Presents At Morgan Stanley 23rd Annual Global Healthcare Conference (Transcript)
seekingalpha.comยท2h
๐Ÿ“‹PREMIS Events
Loading...Loading more...
AboutBlogChangelogRoadmap