๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ Mathematical Art

Fractals, Geometric Patterns, Algorithmic Beauty, Visualization

Snapmaker U1 tool changer
taoofmac.comยท29m
๐ŸฆดBinary Paleography
The today and tomorrow of digital asset management
the-independent.comยท18h
๐Ÿ“„Document Digitization
Sets & Heaps in Haskell and Rust
mmhaskell.comยท3d
๐Ÿ”’Type Safety
A professional square image online tool
squareimage.devยท1dยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
How to expand the market for literature (and literary criticism)
personalcanon.comยท16hยท
Discuss: Hacker News
๐Ÿ›Digital humanities
IBM and AMD Join Forces to Build the Future of Computing
newsroom.ibm.comยท1dยท
Discuss: Hacker News, r/hardware
๐Ÿ–ฅ๏ธTerminal Renaissance
Should You Hire an AI Artist or a Concept Artist?
80.lvยท5dยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Physics
The defense against slop and brainrot - by Paul Jun
pauljun.substack.comยท3dยท
Discuss: Substack
๐Ÿง Intelligence Compression
Build a baby Claude Code using Python
siddharthbharath.comยท2dยท
Discuss: Hacker News
โšกProof Automation
Comet Browser: The Revolutionary AI-Powered Browser That Actually Does Your Work
dev.toยท12hยท
Discuss: DEV
๐Ÿš€Indie Hacking
Creating Wikipedia Search Embeddings with a Gaia Node
dev.toยท1dยท
Discuss: DEV
๐Ÿ›Wikidata
Bias Amplification in Stable Diffusion's Representation of Stigma Through Skin Tones and Their Homogeneity
arxiv.orgยท2d
๐ŸŒˆColor Science
Automated Geospatial Anomaly Detection via Spatio-Temporal Graph Neural Networks and Bayesian Inference
dev.toยท11hยท
Discuss: DEV
๐ŸŒ€Differential Geometry
Adaptive Harmonic Mitigation in Distributed Power Converters via Reinforcement Learning
dev.toยท14hยท
Discuss: DEV
โšกIncremental Computation
Jeff Su: 3 AI Habits So Powerful It Feels Like Cheating
dev.toยท17hยท
Discuss: DEV
๐Ÿš€Indie Hacking
FLAegis: A Two-Layer Defense Framework for Federated Learning Against Poisoning Attacks
arxiv.orgยท1d
๐ŸคSecure Multiparty
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.orgยท1d
๐Ÿ”’Language-based security
Minimal Multi-Stage Form Wizard with AI Review
dev.toยท1dยท
Discuss: DEV
โœจEffect Handlers
The Software Is Always Broken (And AI Is Just Broken Faster)
dev.toยท18hยท
Discuss: DEV
โš™๏ธProof Engineering
SafeBimanual: Diffusion-based Trajectory Optimization for Safe Bimanual Manipulation
arxiv.orgยท2d
๐ŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap