🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌊 Nordic Protocols

Scandinavian Network History, Swedish Standards, Regional Computing, Cultural Networking

Solving Dispatch in a Ridesharing Problem Space
eng.lyft.comΒ·2d
🌸Bloom Variants
Join us for RightsCon 2026 in Lusaka, Zambia!
rightscon.orgΒ·3d
πŸ“‹PREMIS Events
The West's Tepid China Deterrence Is Not Working
news.risky.bizΒ·2d
πŸ”“Hacking
BT, EE and Plusnet announce new price rises
the-independent.comΒ·2d
πŸ”€EBCDIC Privacy
Webflow Incident Report
webflow.comΒ·2dΒ·
Discuss: Hacker News
🌊Stream Processing
When Flatpak’s Sandbox Cracks: Real‑Life Security Issues Beyond the Ideal
linuxjournal.comΒ·2dΒ·
Discuss: Lobsters, Hacker News
πŸ“¦Container Security
Matrix Is Not Safe for EU Data Privacy
wire.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Does the Bitter Lesson Have Limits?
dbreunig.comΒ·1dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
OpenAI is building Stargate Norway while its annual spending is expected to soar to $8 billion
the-decoder.comΒ·2d
πŸ‡³πŸ‡΄Norwegian Computing
Breaking the Aid Addiction - Why Pacific Islands Must Choose Sovereignty Over Geopolitical Slavery
hackernoon.comΒ·2d
🌍Cultural Computing
Show HN: Moots AI (YC W22) helps you turn meetup contacts into deals
news.ycombinator.comΒ·2dΒ·
Discuss: Hacker News
🎯Threat Hunting
Everyone Hates Trust & Safety. Everyone Needs Trust & Safety. This Is A Problem.
techdirt.comΒ·2d
πŸ›‘Cybersecurity
A Hitchhiker's Guide to the AI Bubble
fluxus.ioΒ·2dΒ·
Discuss: Hacker News
🧠Intelligence Compression
Memory vs. Context in AI: Why ChatGPT Is Ahead , and Why That Matters
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Giants Protocol: Advancing Real World Assets Tokenization With AI-Driven Infrastructure
hackernoon.comΒ·4d
🏺Protocol Archaeology
What should I buy for my HomeLab?
reddit.comΒ·2hΒ·
Discuss: r/homelab
πŸ–₯Home Lab Setup
China’s AI Security Ecosystem
digitalforensicsmagazine.comΒ·9h
πŸ‡¨πŸ‡³Chinese Computing
Burnout, budgets and breaches – how can CISOs keep up?
techradar.comΒ·1d
πŸ›‘Cybersecurity
Scaling with Redis Sharding in Go: A Practical Guide with Hashing Strategies
dev.toΒ·2dΒ·
Discuss: DEV
πŸ—„οΈDatabase Sharding
Hands On: The Hacker Pager
hackaday.comΒ·2d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap