🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Counting down to Nashville (and San Diego)
keanw.com·1d·
Discuss: www.keanw.com
🏺Compression Museums
Zuckermuskian solopsism
doctorow.medium.com·1d
🔲Cellular Automata
Electricity Prices Are Climbing More Than Twice as Fast as Inflation
hardware.slashdot.org·14h
🇳🇱Dutch Computing
Dirty Coding Tricks
gamedeveloper.com·3d·
Discuss: Lobsters
🎮Game Decompilation
Rewriting Numaflow (for AI), an open-source stream processing platform, in Rust
blog.numaproj.io·1d·
Discuss: Hacker News
🦀Rust Borrowing
Competitors walk slackline 400m above Chinese gorge in bid for championship glory
the-independent.com·4h
📊Rate-Distortion Theory
A programmer's field guide to assertions
typesanitizer.com·3d·
Discuss: Lobsters, Hacker News
📜Proof Carrying Code
Interoperability in 2025: Beyond the Erlang VM
elixir-lang.org·1d·
Discuss: Lobsters, Hacker News
🔒Linear Types
9 Years of “Learning to Code” and I Still Couldn’t Build a To-Do App
offpeaklog.bearblog.dev·23h·
Discuss: Hacker News
📏Code Metrics
Quark’s Outlines: Python Complex Numbers
dev.to·2d·
Discuss: DEV
🧮Z3 Applications
From Chaos to Clarity: AI Approaches for PDF & Unstructured Data Extraction
dev.to·1d·
Discuss: DEV
📄Document AI
**Targeted Transcriptional Silencing of MET via Engineered KRAS-Specific Small Molecules**
dev.to·1d·
Discuss: DEV
🔄Document Workflows
When the Plumbing Fights Back: A Spam Bot Tragedy in Three Acts
zakelfassi.com·2d·
Discuss: Hacker News
📡Feed Archaeology
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
arxiv.org·2d
🔐Homomorphic Encryption
Top casino gaming firm Bragg says it was hit by a cyberattack - but the hackers may not have struck the jackpot
techradar.com·14h
🛡Cybersecurity
Silent Code: The Unseen Algorithms Reshaping Your Digital World
dev.to·6d·
Discuss: DEV
🚀Indie Hacking
Revisiting Diffusion Q-Learning: From Iterative Denoising to One-Step Action Generation
arxiv.org·11h
🔲Cellular Automata
Automated Anomaly Detection & Predictive Maintenance via Graph Neural Network Fusion in High-Throughput Manufacturing
dev.to·2d·
Discuss: DEV
🌊Stream Processing
OpenConstruction: A Systematic Synthesis of Open Visual Datasets for Data-Centric Artificial Intelligence in Construction Monitoring
arxiv.org·2d
🏺Computational Archaeology
Thoughts on creating a tracking pointer class, part 6: Non-modifying trackers
devblogs.microsoft.com·2d
🦀Rust Borrowing
Loading...Loading more...
AboutBlogChangelogRoadmap