๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โš–๏ธ Lossy Compression Ethics

Quality Trade-offs, Cultural Preservation, Information Loss, Archival Standards

Data Breach Trends Highlight Mobile and Credential Risks
zimperium.comยท13h
๐Ÿ’ฃCompression Security
For Indigenous communities, AI brings peril โ€” and promise
grist.orgยท17h
๐ŸŒCultural Computing
An unusual hardware architecture: APA (Associative Processing Array)
yosefk.comยท1d
โšกHomebrew CPUs
Lock down your critical infrastructure, CISA begs admins
theregister.comยท8h
๐Ÿ›กCybersecurity
Kubernetes Resource Optimization Strategies That Work in Production
scaleops.comยท12hยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Zoom patches worrying security Windows flaw - make sure you're protected, update now
techradar.comยท12h
๐Ÿ”“Hacking
Intriguing Properties of GPT-OSS Jailbreaks
xlabaisecurity.comยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Fabricated data in posts.xml for multiple/all data dumps
meta.stackexchange.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
History of improvements in VACUUM in PostgreSQL (2023)
enterprisedb.comยท5hยท
Discuss: Lobsters, Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
Accelerating JavaScript (In the Browser)
jonathandinu.comยท2dยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
original โ†—
nickyreinert.deยท3dยท
Discuss: Hacker News
โš–๏ธGame Preservation Ethics
OOMProf - Take a heap profile just before OOMkill using eBPF
polarsignals.comยท1dยท
Discuss: Lobsters, Hacker News, r/golang
๐Ÿง Memory Forensics
How do I become a writer/coder/creator/entrepreneur/x?
emeaentrepreneurs.comยท1dยท
Discuss: Hacker News
โญAwesome lists
For Some Patients, the โ€˜Inner Voiceโ€™ May Soon Be Audible
nytimes.comยท11hยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
Software Engineering Laws - Quality & Testing
leadership.gardenยท9h
โš™๏ธProof Engineering
Automated Prognostics & Health Management for Starship Service Module Thermal Control System via Bayesian Dynamic Networks
dev.toยท14hยท
Discuss: DEV
๐Ÿ›ก๏ธError Boundaries
READER: Retrieval-Assisted Drafter for Efficient LLM Inference
arxiv.orgยท1d
๐Ÿ”„Burrows-Wheeler
Ethics2vec: aligning automatic agents and human preferences
arxiv.orgยท2d
๐Ÿค–AI Curation
Reducing Time to Value for Data Science Projects: Part 4
towardsdatascience.comยท2d
๐Ÿ”„Reproducible Builds
The three Ps โ€“ why partners, procurement and pivot are the key focuses for cyber policy
techradar.comยท1d
๐Ÿ”Capability Security
Loading...Loading more...
AboutBlogChangelogRoadmap