🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
❄️ Nordic Preservation

Scandinavian Archives, Swedish Digital Heritage, Regional Standards, Cold Storage

30 years at Autodesk
keanw.com·4h·
Discuss: www.keanw.com
🧲RISC-V Archaeology
Log Detective: GSoC 2025 (part 2)
danigm.net·2d
🔓Open Source Software
Newcastle move for Woltemade 'developing' but Isak clarity 'difficult'
bbc.com·57m
🦐Göteborg
Jetkvm is now available at retail via ikoolcore! Available to USA!
ikoolcore.com·2d·
Discuss: r/homelab
🔌Operating system internals
Esoteric Ebb: a Dungeons & Dragons-style campaign that lets you be as stupid as you like
theguardian.com·1d
🇸🇪Nordic Demoscene
20k years ago, a single flood swept through the world
wionews.com·1d·
Discuss: Hacker News
📰RSS Archaeology
How to wear foundation over 50
the-independent.com·4h
🌈Color Archaeology
Humble Bundle Pearson Books Bundle
reddit.com·10h·
Discuss: r/linux
🔌Operating system internals
Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
zscaler.com·2d·
Discuss: Hacker News
🦠Malware Analysis
Fire crews from across country arrive in North Yorkshire to fight moorland blaze
the-independent.com·21h
🇸🇪Nordic Algorithms
The Latest: Trump connections accused of covert influence operations in Greenland
the-independent.com·1d
🕵Intelligence
Izaña-2 joins the laser game to track space debris
phys.org·19h·
Discuss: r/space
🔬Optical Physics
Dropbox password manager shutdown begins this week - here is what you need to do next
techradar.com·1d
🔐Archive Encryption
From Law to Gherkin: A Human-Centred Quasi-Experiment on the Quality of LLM-Generated Behavioural Specifications from Food-Safety Regulations
arxiv.org·6h
📝ABNF Parsing
Numerical Method for Space-Time Fractional Diffusion: A Stochastic Approach
arxiv.org·6h
📊Computational Geometry
Regulatory compliance: Act now
techradar.com·1d
🎯Threat Hunting
Skeptik: A Hybrid Framework for Combating Potential Misinformation in Journalism
arxiv.org·2d
📰Content Curation
Digital Asset Management Demos and Proof of Concepts
weareavp.com·1d
🏺ZIP Archaeology
Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows
tenable.com·1d
🎯Threat Hunting
ATM-GAD: Adaptive Temporal Motif Graph Anomaly Detection for Financial Transaction Networks
arxiv.org·6h
🔍Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap