๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฐ Medieval Networks

Manuscript Distribution, Scriptoriums, Information Networks, Cultural Transmission

Saving the current URL to a Note
akrabat.comยท1d
๐ŸŒWeb Archiving
Hackers Are Targeting Your Salesforce: What You Need to Know
lmgsecurity.comยท4h
๐Ÿ”“Hacking
How to Secure GitHub Actions: Best Practices
boostsecurity.ioยท10h
๐ŸŒณGit Internals
Hackers breach cancer screening data of almost 500k women
dutchnews.nlยท8hยท
Discuss: Hacker News
๐Ÿ‡ณ๐Ÿ‡ฑDutch Computing
The End of Handwriting
wired.comยท2dยท
Discuss: Hacker News
๐Ÿ“œDocument Physics
https://blog.wilsonl.in/search-engine/?s=09
blog.wilsonl.inยท3d
๐Ÿ”BitFunnel
โ€˜Maps are not innocent drawingsโ€™: Africa demands its true size be shown
english.elpais.comยท10h
๐Ÿ“ธTIFF Archaeology
Competitors walk slackline 400m above Chinese gorge in bid for championship glory
the-independent.comยท12h
๐Ÿ“ŠRate-Distortion Theory
Carefree Tesla drivers: TeslaMate installations openly on the network
heise.deยท2h
๐Ÿ Home Automation
Beginnerโ€™s Guide to Security Technology for Homes and Offices
dev.toยท8hยท
Discuss: DEV
๐Ÿ Home Automation
Google's Chrome Antitrust Paradox
arxiv.orgยท2d
๐Ÿ”BitFunnel
Fashionable Phishing Bait: GenAI on the Hook
unit42.paloaltonetworks.comยท1d
๐ŸŽซKerberos History
Automated Building Heritage Assessment Using Street-Level Imagery
arxiv.orgยท2d
๐ŸบComputational Archaeology
Unveiling the Unseen: A Comprehensive Survey on Explainable Anomaly Detection in Images and Videos
arxiv.orgยท1d
๐Ÿ”Vector Forensics
CORE: Measuring Multi-Agent LLM Interaction Quality under Game-Theoretic Pressures
arxiv.orgยท1d
๐ŸงฎKolmogorov Complexity
A Generalized Genetic Random Field Method for the Genetic Association Analysis of Sequencing Data
arxiv.orgยท1d
๐Ÿ“ˆMutual Information
Automated Cloud Resource Allocation via Hybrid Reinforcement Learning and Bayesian Optimization
dev.toยท7hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Who Gets the Mic? Investigating Gender Bias in the Speaker Assignment of a Speech-LLM
arxiv.orgยท19h
๐ŸŽ™๏ธWhisper
NANC: Political Alpha Hypothesis Meets Structural Flaws
seekingalpha.comยท17h
๐Ÿ”BitFunnel
The Developerโ€™s Guide to AI Application Testing: 10 Essential Tools for 2025
dev.toยท11hยท
Discuss: DEV
๐Ÿ”Concolic Testing
Loading...Loading more...
AboutBlogChangelogRoadmap