๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”„ RSS Infrastructure

Feed Discovery, OPML Management, Subscription Workflows, Content Syndication

Marks and counters in Sysprof
feaneron.comยท1d
๐Ÿ‘๏ธSystem Observability
TU Graz Develops Hook-and-Loop Fastener for Building Components
3dprintingindustry.comยท14hยท
Discuss: Hacker News
๐Ÿ”จSwedish Craftsmanship
Comparative Study of YOLOv5 and YOLOv8 for Challenging Aquatic Object Detection
hackernoon.comยท20h
๐Ÿ”Lens Correction
Revolutionary Web Application Drives Precision, Operational Efficiency, and Elevated User Experience
hackernoon.comยท11h
๐ŸŒŠStreaming Systems
The OSS code that powers Claude and the maintainer they didn't hire
agenticweb.nearestnabors.comยท5hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Understanding CSRF and How to Prevent It in Your Application โ€” Part 2
infosecwriteups.comยท23h
๐Ÿ”คEBCDIC Privacy
React and Text/Event-Stream
github.comยท1dยท
Discuss: Hacker News
๐ŸŽฅStreaming Codecs
Best 7 WeTransfer Alternatives for Secure File Sharing 2025
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Archive Encryption
Microsoft Patch Tuesday, September 2025 Security Update Review
blog.qualys.comยท11h
๐Ÿ”“Hacking
ALLabel: Three-stage Active Learning for LLM-based Entity Recognition using Demonstration Retrieval
arxiv.orgยท2h
๐Ÿ”Information Retrieval
Why Concordiumโ€™s Compliance First Blockchain Could Push Stablecoins Mainstream
hackernoon.comยท14h
๐ŸคDistributed Consensus
Unlocking the Power of Agentic AI with Apache Iceberg and Dremio
dev.toยท4dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Team-Based Authorization in faynoSync โ€” An Overview for Developers
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Sync Engine
Topological Regularization for Force Prediction in Active Particle Suspension with EGNN and Persistent Homology
arxiv.orgยท1d
๐ŸŒComputational Topology
LESER: Learning to Expand via Search Engine-feedback Reinforcement in e-Commerce
arxiv.orgยท1d
๐Ÿ”Information Retrieval
Hyper-Dimensional Residual Network Refinement for Conformational Landscape Sampling of Glycoprotein Domains
dev.toยท1dยท
Discuss: DEV
๐Ÿง Machine Learning
You too can run malware from NPM (I mean without consequences)
github.comยท20hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Leveraging Support Vector Regression for Outcome Prediction in Personalized Ultra-fractionated Stereotactic Adaptive Radiotherapy
arxiv.orgยท2h
๐Ÿ“Vector Dimensionality
OSSpocalypse? What To Know About The Hacks Of Leading Open Source Packages
reversinglabs.comยท16h
๐Ÿ”“Hacking
Cisco to Add AI Agents to Splunk Observability Platforms
devops.comยท12h
๐Ÿ“ŠHomelab Monitoring
Loading...Loading more...
AboutBlogChangelogRoadmap