🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🗃️ Punched Cards

Historical Computing, IBM Cards, Data Processing Heritage, Mechanical Calculation

Japanese students struggle with description-type tests
japantimes.co.jp·17h
🇯🇵Japanese Computing
The Good, the Bad and the Ugly in Cybersecurity – Week 31
sentinelone.com·4h
🛡Cybersecurity
Deep research for healthcare revenue cycle
writing.kunle.app·4h·
Discuss: Hacker News
🔗Data Provenance
Apache Flink 2.1.0 Released
flink.apache.org·1d·
Discuss: Hacker News
🌊Streaming Databases
These Six 'Misunderstandings' Can Seriously Impact Your Hospital Bill
lifehacker.com·4h
💻Local first
Nvidia announces end of GPU driver updates for GeForce 10-series, Windows 10
arstechnica.com·1d·
Discuss: r/technews
🖥️Modern Terminals
AMD's Ryzen 7 9800X3D gaming chip champ drops to $449 at Amazon — $29 off its MSRP
tomshardware.com·2h
🖥️Modern CPU
The Ghost in the Graph, Pt. 1: How Beliefs Become Organizational Behavior
vasily.cc·2d·
Discuss: Hacker News
🌍Cultural Algorithms
Martin Lewis explains car finance mis-selling case as Supreme Court to deliver verdict
the-independent.com·2h
✅Formal Methods
Pokémon TCG Pocket will change card art after plagiarism accusations
theverge.com·2d
🗃️Punch Card Recovery
Show HN: AgentSmith-HUB – Real-time security data pipeline and detection engine
github.com·8h·
Discuss: Hacker News
🎯Threat Hunting
What is personalized pricing, and how do I avoid it?
phys.org·1d
⚡Incremental Computation
I Built an Vibe Coding Misalignment Detector (and Used It to Build Itself)
github.com·1d·
Discuss: Hacker News
✅Archive Fixity
AI Ethics: Navigating Future Challenges
dev.to·1d·
Discuss: DEV
🤖AI Curation
The Art of the Hack: From Suspicion to Submission
dev.to·11h·
Discuss: DEV
🚀Indie Hacking
It Shouldn’t Exist: Astronomers Discover a Planet Orbiting the “Wrong Way”
scitechdaily.com·3h
📐Mathematical Art
Figma's S-1/A from their IPO today
sec.gov·21h·
Discuss: Hacker News
⚡HTMX
A sustainable biotechnology approach for mineral separation
phys.org·1d
🧪Cassette Chemistry
Cracking the code: resilient defense and rapid recovery
techradar.com·1d
💾Persistence Strategies
NIST Post-Quantum Cryptography Standard Algorithms Based on Quantum Random Number Generators
arxiv.org·2d
🔐Quantum Cryptography
Loading...Loading more...
AboutBlogChangelogRoadmap