๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Privacy Preserving

Homomorphic Encryption, Differential Privacy, Federated Learning, Secure Computation

An engineerโ€™s path from data loss to software preservation
softwareheritage.orgยท1d
๐Ÿ”„Archival Workflows
Storage advice wanted for my homelab
reddit.comยท8hยท
Discuss: r/homelab
๐Ÿ Homelab Preservation
6 Design Principles for Edge Computing Systems
thenewstack.ioยท8h
๐ŸŒEdge Preservation
What browser fingerprinting tests like Amiunique show, and what they miss
blog.castle.ioยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
blog.cloudflare.comยท9hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Maybe writing speed actually is a bottleneck for programming
buttondown.comยท3hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.orgยท2d
๐ŸŽตAudio ML
Edsger W. Dijkstra on IPW's
cs.utexas.eduยท2dยท
Discuss: Hacker News
๐Ÿ‡ท๐Ÿ‡บSoviet Computing
Machine Learning Fundamentals: dimensionality reduction example
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Vector Dimensionality
The Future of IoT AI in 2025 and Beyond
dev.toยท19hยท
Discuss: DEV
๐ŸŒŠStream Processing
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.toยท10hยท
Discuss: DEV
๐ŸŒDistributed Hash
Where Security Begins: 5 Insights from the Intersection of Engineering and Teaching
hackernoon.comยท1d
๐Ÿ›กCybersecurity
How Apex Fusion and Well-Typed Are Shaping the Future of Institutional DeFi on Cardano
hackernoon.comยท1d
๐ŸคDistributed Consensus
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgยท1d
๐ŸŒDNS Security
Three unrelated thoughts about working with LLMs
henrycourse.comยท23hยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Machine Learning Fundamentals: dropout
dev.toยท5hยท
Discuss: DEV
๐ŸŒŠStream Processing
Redefining Data Operations With Data Flow Programming in CocoIndex
hackernoon.comยท10h
๐ŸŒŠStream Processing
Study finds elites' offshore asset strategies shaped by home country governance
phys.orgยท1d
๐Ÿ”—Data Provenance
Sparse Identification of Nonlinear Dynamics with Conformal Prediction
arxiv.orgยท18h
๐ŸงฎKolmogorov Bounds
A Study on the Application of Artificial Intelligence in Ecological Design
arxiv.orgยท18h
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap