🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚖️ Lossy Compression Ethics

Quality Trade-offs, Cultural Preservation, Information Loss, Archival Standards

Funding Open Source like public infrastructure
dri.es·12h·
Discuss: r/opensource
🔓Open Source Software
Beyond Compliance to Securing Advantage Under EU Digital Regulation
whybyproduct.substack.com·7h·
Discuss: Substack
⚖️Legal Compliance
Iceberg Table Corruption and Data Loss in Production
ryft.io·23h·
Discuss: Hacker News
🔧KAITAI
A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features
usenix.org·12h
🔓Open Source Software
Learning Optimal and Fair Policies for Online Allocation of Scarce Societal Resources from Data Collected in Deployment
arxiv.org·15h
⚡Incremental Computation
Sandboxing AI-Generated Code: Why We Moved from WebR to AWS Lambda
quesma.com·1d·
Discuss: Hacker News, r/programming
🛡️WASM Sandboxing
Decentralized Proof-of-Location systems for trust, scalability, and privacy
nature.com·2d·
Discuss: Hacker News
🤝Distributed Consensus
Securing Meta's Production PKI Credentials
usenix.org·12h
🎯NTLM Attacks
Lookup Table Madness (2004)
sqlservercentral.com·22h·
Discuss: Hacker News
🏺Database Archaeology
What If A.I. Doesn’t Get Much Better Than This?
newyorker.com·1d·
Discuss: Hacker News, Hacker News
🔲Cellular Automata
How do I become a writer/coder/creator/entrepreneur/x?
emeaentrepreneurs.com·9h·
Discuss: Hacker News
⭐Awesome lists
Three tragedies that shape human life in age of AI and their antidotes
link.springer.com·3h·
Discuss: Hacker News
🔲Cellular Automata
Why Kafka Capacity Planning Is So Challenging?
kaimingwan.substack.com·1d·
Discuss: Substack
🌊Streaming Systems
From private to public: How a United Nations organization open sourced its tech
github.blog·2h·
Discuss: Hacker News
🔓Open Source Software
From DeepSeek-MoE to R1: how expert routing and RL made the leap
chrishayduk.com·2h·
Discuss: Hacker News
🔍Vector Forensics
Sonar Surfaces Multiple Caveats When Relying on LLMs to Write Code
devops.com·6h
📏Code Metrics
LightShed: Defeating Perturbation-based Image Copyright Protections
usenix.org·12h
👁️Perceptual Hashing
We Create
linus.coffee·1d·
Discuss: Hacker News
🎯Content Recommendation
Superfast Low Rank Approximation
arxiv.org·1d
📐Compression Bounds
Fabricated data in posts.xml for multiple/all data dumps
meta.stackexchange.com·18h·
Discuss: Hacker News
📰RSS Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap