🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Reed-Solomon

Galois Fields, Polynomial Codes, CD Error Correction, BCH Extension

KL-001-2025-007: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Remote Code Execution
seclists.org·14h
🛡️eBPF Security
Introducing Phi-4-mini-flash-reasoning
azure.microsoft.com·19h·
Discuss: Hacker News
🧮Z3 Applications
HMQ: Principal Type Inference Under a Prefix
microsoft.com·19h·
Discuss: Hacker News
🔍Type Inference
A Formal Refutation of the Blockchain Trilemma
arxiv.org·1d
🤝Distributed Consensus
RFC 9309 – Robots Exclusion Protocol
datatracker.ietf.org·1h·
Discuss: Hacker News
🌐DNS Security
Lambda calculus cooked N ways: Benchmarks for capture-avoiding substitution
github.com·2d·
Discuss: Hacker News
λLambda Formalization
Efficient Quantum Access Model for Sparse Structured Matrices using Linear Combination of Things
arxiv.org·2d
⚛️Quantum Algorithms
Iceberg, the Right Idea – The Wrong Spec – Part 2 of 2: The Spec
database-doctor.com·15h·
Discuss: Hacker News
🔧KAITAI
Deep Dive into Rails Database Connection Pools
prateekcodes.dev·11h·
Discuss: Hacker News
🌊Streaming Systems
Richard Feynman and the Connection Machine
longnow.org·23m·
Discuss: Hacker News
⚛️Information Physics
I solved the IIT-JEE Mains paper with LLM. Here are the results
iexplain.app·2d·
Discuss: Hacker News
📐Interval Arithmetic
The Ancient History of Compression Algorithms
cs4fn.org·5h·
Discuss: Hacker News
📊Compression Proofs
Swiss boffins just trained a 'fully open' LLM on the Alps supercomputer
theregister.com·6h·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Towards Exception Safety Code Generation with Intermediate Representation Agents Framework
arxiv.org·1d
⚔️Lean Tactics
Business Wire: "JEDEC Releases New LPDDR6 Standard to Enhance Mobile and AI Memory Performance"
businesswire.com·18h·
Discuss: Hacker News, r/hardware
🔧Hardware Verification
Wrapless: The trustless lending protocol on top of Bitcoin
arxiv.org·1d
🔗Hash Chains
The REM-arkable Misadventures of LIST
masswerk.at·2d·
Discuss: Hacker News
📺VT100
An InfoSec Architect's First Taste of Temporal
supasaf.com·1d·
Discuss: Hacker News
⏰Temporal Logic
Polyadic encryption
arxiv.org·1d
🌊Stream Ciphers
The Unreasonable Effectiveness of Recurrent Neural Networks
karpathy.github.io·7h·
Discuss: Hacker News
🧠Neural Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap