๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ฆ Package Managers

Dependency Resolution, Version Constraints, Lock Files, Security

CORNETO: Machine learning to decode complex omics data
phys.orgยท3h
๐Ÿ—‚๏ธVector Databases
Nebius: Everyone Talks About AWS And Azure - But This Tiny Player Is Gaining Ground
seekingalpha.comยท10h
๐Ÿ”BitFunnel
Open source microprocessors with Jan Pleskac
opensourcesecurity.ioยท1d
๐Ÿ”ฌHardware Forensics
RayEditor: Modern, customizable, & lightweight WYSIWYG editor in pure JavaScript
rohanyeole.comยท13hยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
CEO of Ghost CMS silenced an independent publication that dared to criticize
forum.ghost.orgยท1dยท
Discuss: Hacker News
๐Ÿ”„RSS Infrastructure
SQL Injection as a Feature
idiallo.comยท21hยท
Discuss: Hacker News
โ›๏ธSQL Archaeology
Diary of a Startup โ€“ the rise and fall of ArsDigita
web.archive.orgยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Crowdstrikeโ€™s massive cyber outage 1-year later: lessons enterprises can learn to improve security
venturebeat.comยท16hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Crates.io Implements Trusted Publishing Support
socket.devยท5dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Usage Rules: Leveling the Playing Field for AI-Assisted Development
zachdaniel.devยท3dยท
Discuss: Hacker News
โšกProof Automation
Show HN: Brain-rot Factory โ€“ Italian meme characters powered by AI (Next.js 15)
brain-rot-factory.vercel.appยท12hยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
Running LLMs against a sandbox airport to see if they can make the correct decisions in real time
github.comยท12hยท
Discuss: Hacker News, r/LocalLLaMA
๐ŸงฉWASM Components
Just completed AWS AI & ML challenge.
dev.toยท20hยท
Discuss: DEV
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Understanding the Impact of Scattered Spider on the Airline & Transportation Industry
blog.qualys.comยท1d
๐Ÿ”“Hacking
Scaling Enterprise GenAI with MCP (Bloomberg Case Study)
dev.toยท2dยท
Discuss: DEV
๐Ÿฆ‹Format Evolution
๐Ÿ” FastAPI JWT Authentication with SQLite Database for Secure APIs
dev.toยท1dยท
Discuss: DEV
๐ŸงฉSQLite Extensions
Combining model tracing and constraint-based modeling for multistep strategy diagnoses
arxiv.orgยท1d
๐ŸงฎConstraint Solvers
Arch Linux pulls AUR packages that installed Chaos RAT malware
bleepingcomputer.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Language Generation in the Limit: Noise, Loss, and Feedback
arxiv.orgยท11h
๐Ÿ’ปProgramming languages
MCP (Model Context Protocol) Explained Simply ๐Ÿค–
dev.toยท3hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap