๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

โŒฅ The U.S.โ€™ Increasing State Involvement in the Tech Industry
pxlnv.comยท1d
๐Ÿ›กCybersecurity
Learning Through Doing: From one language to another
blog.scottlogic.comยท5d
๐Ÿฆ€Rust Borrowing
The Relativity of Wrong by Isaac Asimov (1988)
hermiene.netยท21hยท
Discuss: Hacker News
๐Ÿ›๏ธPhilosophy
Radiocarbon dating of Jerusalem's Siloam Dam links climate and major waterworks
pnas.orgยท9hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Komodo 1.19 Build and Deploy Tool Brings New CLI, Action Arguments
linuxiac.comยท1d
โ„๏ธNix Flakes
Starting In Biotech: An overview of biotech for the curious engineer
blog.zkagin.comยท17hยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
What Hugging Face reveals about the data economy of fine-tuning
research.portexai.comยท4dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Show HN: Image Description Generator โ€“ auto-generate alt text from any image
image-description-generator.netยท4dยท
Discuss: Hacker News
๐Ÿ—œ๏ธLZW Variants
Google reveals just how much energy each Gemini query uses - but is it being entirely truthful?
techradar.comยท1d
๐ŸŒก๏ธPreservation Thermodynamics
Google will block sideloading of unverified Android apps starting next year
arstechnica.comยท1dยท
Discuss: r/Android, r/Piracy, r/technews
๐Ÿ›ก๏ธARM TrustZone
Debugging the Instant Macropad
hackaday.comยท1d
๐Ÿ“บVT100
College Dorm Essentials Are Majorly Discounted. Hereโ€™s Whatโ€™s Worth Grabbing Right Now.
popularmechanics.comยท1d
โ˜•Coffee
My honest take a year into building AI copilots for top YC startups
dev.toยท17hยท
Discuss: DEV
โšกProof Automation
Bioengineered bacteria could lead to therapeutic antibody drugs
phys.orgยท17h
๐ŸงฌCopy Number Variants
Advice on Setting Up Multiple Docker Containers in a Homelab
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
useMergedRefs: The Essential Custom Hook for Component Composition
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏGradual Typing
ZipLine attack uses 'Contact Us' forms, White House butler pic to invade sensitive industries
theregister.comยท14h
๐Ÿ”“Hacking
Automated Grain Boundary Characterization via Deep Feature Extraction and Bayesian Inversion in HR-TEM Data
dev.toยท3dยท
Discuss: DEV
๐ŸบComputational Archaeology
Is Prompt Engineering Just Hype for Now?
dev.toยท3dยท
Discuss: DEV
๐ŸŒŠStream Processing
Agent Communication Protocol (ACP): The Open Standard for AI Agent Interoperability ๐Ÿš€
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap