๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›๏ธ Mainframe Archaeology

COBOL Recovery, EBCDIC Translation, Legacy Migration, Business Logic Extraction

The Air Gap Is an Illusion: Securing AI Data Centers from Wireless Threats
bastille.netยท1d
๐ŸŽซKerberos History
8th September โ€“ Threat Intelligence Report
research.checkpoint.comยท2d
๐Ÿ”“Hacking
Unicode 17.0 Release Announcement
blog.unicode.orgยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”ฃUnicode
Human vs. JSON output formatting: avoid mixing concerns
blog.liw.fiยท2dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
KDE launches its own distribution (again)
lwn.netยท2hยท
Discuss: Lobsters, Hacker News
๐Ÿ”ŒOperating system internals
Cowboy Coders and the Shift to Structure โ€“ How Teams Grow
codecube.netยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
The world has a running Rational R1000/400 computer again (2019)
datamuseum.dkยท3dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
The Three Sacred Guardrails of AI
aboard.comยท6dยท
Discuss: Hacker News
โšกProof Automation
Can AI code? Study maps the roadblocks to autonomous software engineering
csail.mit.eduยท2dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Programmable Locking Cells (PLC) for Modular Robots with High Stiffness Tunability and Morphological Adaptability
arxiv.orgยท20h
โœ‹Tactile Computing
No gains, just pains as 1.6M fitness phone call recordings exposed online
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŠAcoustic Forensics
Halfway Through The S21 Global Alliance Database & Investigator Wellbeing Spotlight Session
forensicfocus.comยท14h
๐Ÿ”—Data Provenance
How to Build Effective AI Agents to Process Millions of Requests
towardsdatascience.comยท1d
๐Ÿ”—Constraint Handling
K2 Think: Abu Dhabi's Efficient AI Model Challenges Industry Giants
dev.toยท1dยท
Discuss: DEV
๐Ÿง Intelligence Compression
Forest fire detection system
hackster.ioยท11h
โš™๏ธDIY Electronics
OSSpocalypse? What To Know About The Hacks Of Leading Open Source Packages
reversinglabs.comยท1d
๐Ÿ”“Hacking
Fault Tolerant Control of a Quadcopter using Reinforcement Learning
arxiv.orgยท20h
๐Ÿ›ก๏ธError Boundaries
Proxmox - Win11 Installation
blog.raymond.burkholder.netยท3d
๐Ÿ”ŒOperating system internals
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities
arxiv.orgยท6d
๐ŸงชCBOR Fuzzing
Quantize Your Vectors, Speed Up Your Java AI Applications
dev.toยท2dยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
Loading...Loading more...
AboutBlogChangelogRoadmap