🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧲 Magnetic Philosophy

Storage Ethics, Information Rights, Preservation Politics, Media Ontology

Mullin, Casey A., - Many pathways for discovery : describing music resources using faceted vocabularies / by Casey A. Mullin.
libris.kb.se·5d
📇Dublin Core
Channels for effective software team communication in messaging tools
blog.scottlogic.com·1d
📰RSS Archaeology
Are Electrons Conscious?
blog.oup.com·5d·
Discuss: Hacker News
🏛️Philosophy
You can just build things
maxrozen.com·2d·
Discuss: Hacker News, r/programming
⚙️Build Archaeology
The AI-Powered PDF Marks the End of an Era
wired.com·10h·
Discuss: Hacker News
📄PDF Archaeology
I tested Datadog network monitoring and found it amazing for analytics and integrations review
techradar.com·12h
📊Homelab Monitoring
Adobe launches new Acrobat Studio for PDF power users - and it has more AI than you'll know what to do with
techradar.com·10h
📄PostScript
DORA: six months into a resilience revolution
techradar.com·16h
🎯Threat Hunting
“Privacy preserving age verification” is bullshit
doctorow.medium.com·5d
🔓Hacking
The Price of Cheaper Data: Measuring the Strategic Inefficiencies in the Post-EIP-4844 Ethereum Market
arxiv.org·1d
🌳Archive Merkle Trees
Towards Smart Workplaces: Understanding Mood-Influencing Factors of the Physical Workspace in Collaborative Group Settings
arxiv.org·1d
🎨Nordic Design
Poplar tree discovery could help shape the future of energy and biomaterials
phys.org·8h
📜Document Physics
Misago is fully featured modern forum that is fast/scalable/responsive
github.com·2h·
Discuss: Hacker News
🔓Open Source Software
They keep coming! One more workstation laptop has emerged with an AMD Ryzen AI MAX 395 CPU - and I can't wait to find out how much it costs
techradar.com·46m
🇩🇪German Computers
The Hidden Geometry That Could Explain the Universe
scitechdaily.com·2d·
Discuss: Hacker News
📐Mathematical Art
CryptoScope: Utilizing Large Language Models for Automated Cryptographic Logic Vulnerability Detection
arxiv.org·1d
🧪Binary Fuzzing
Blending direct and indirect reciprocity: Researchers create tolerance-based cooperation framework
phys.org·1d
🤝Consensus Networks
Analyzing evolution of the PipeMagic malware
securityaffairs.com·15h
🔓Hacking
Chapter 7: The distraction machine
english.elpais.com·2d
🧮Kolmogorov Bounds
Do Large Language Model Agents Exhibit a Survival Instinct? An Empirical Study in a Sugarscape-Style Simulation
arxiv.org·19h
🔲Cellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap