🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

A Brazilian Perspective on Computing for the Planet’s Sustainability
cacm.acm.orgΒ·19h
🧊Arctic Storage
Protecting Science: TIB Builds Dark Archive for ArXiv
blog.tib.euΒ·4hΒ·
Discuss: Hacker News
πŸ“šMARC Records
Sci-fi interfaces | IxD Lessons from Sci-Fi
scifiinterfaces.comΒ·4h
πŸ›Digital humanities
SigNoz (YC W21, Open Source Datadog) Is Hiring DevRel Engineers (Remote)(US)
ycombinator.comΒ·15hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
C++ Seeding Surprises (2015)
pcg-random.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’Bitwise Algorithms
Structured data response with Amazon Bedrock: Prompt Engineering and Tool Use
aws.amazon.comΒ·18h
πŸŒ€Brotli Internals
Exclusive deal: 4 months free with NordVPN's two-year plans, plus up to $50 in Amazon gift vouchers
techradar.comΒ·1d
🎬AV1 Encoding
2025 G7 Data Protection and Privacy Authorities Roundtable Statement
priv.gc.caΒ·3dΒ·
Discuss: Hacker News
πŸ”’Privacy Preserving
Distilling Normalizing Flows
arxiv.orgΒ·6h
πŸ“₯Feed Aggregation
Structuralist Approach to AI Literary Criticism: Leveraging Greimas Semiotic Square for Large Language Models
arxiv.orgΒ·6h
πŸ“œDigital Philology
Streamlined Baremetal Deployment: A Journey of Custom Controll... Mitsuhiro Tanino & Masanori Kuroha
youtube.comΒ·13h
πŸ–₯️Self-hosted Infrastructure
Critical Security Importance Digital Age Web Techniques(1750818928214500οΌ‰
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Digital Privacy Everywhere
arxiv.orgΒ·3d
πŸ”Homomorphic Encryption
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.comΒ·21h
🎯Threat Hunting
Sony tests beta version for image authentication
heise.deΒ·18h
πŸ‘οΈOCR Verification
Floating-Point Data Transformation for Lossless Compression
arxiv.orgΒ·3d
🌊Streaming Compression
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”—Data Provenance
TITAN: Query-Token based Domain Adaptive Adversarial Learning
arxiv.orgΒ·6h
πŸ“ŠLearned Metrics
How to Write a Software Project Proposal: Complete Template & Guide
dev.toΒ·1dΒ·
Discuss: DEV
πŸ¦‹Format Metamorphosis
Loading...Loading more...
AboutBlogChangelogRoadmap