๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฆ€ Rust Verification

Memory Safety Proofs, Linear Types, Borrow Checker, Systems Verification

Glue work instead of pasting diagrams
thehighergeometer.wordpress.comยท16h
๐ŸŒฑPersonal Wikis
Abstract algebra structures made easy
blog.sesse.netยท5d
๐Ÿ”€Category Theory
Java Thread Dump Analyzer โ€“ Identify and Solve Threading Issues
threadanalyzer.onlineยท16hยท
Discuss: Hacker News
โšกPerformance Tools
The Bias-Variance Trade-Off: A Visual Explainer
machinelearningmastery.comยท1d
๐Ÿ“ŠLearned Metrics
In Xcode 26, Apple shows first signs of offering ChatGPT alternatives
arstechnica.comยท22hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Storage at GPU Speed: Benchmarking Graid SupremeRAID AE for AI
storagereview.comยท2dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
Texas attorney general accuses Meta, Character.AI of misleading kids with mental health claims
techcrunch.comยท2dยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Slack-Native AI Agents
xpander.aiยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
AI for Cybersecurity: Building Trust in Your Workflows
securityaffairs.comยท2d
๐ŸŽฏThreat Hunting
Wrapping Up The S21 Transcriber Spotlight Session โ€“ What Weโ€™ve Covered
forensicfocus.comยท10h
๐Ÿ’ฟDAT Forensics
DNS at IETF 123
blog.apnic.netยท1d
๐ŸŒDNS Security
Virtual Trading in Multi-Settlement Electricity Markets
arxiv.orgยท1d
๐ŸคConsensus Algorithms
Pinned Device Memory Patches For Intel's Multi-GPU "Project Battlematrix" Linux Efforts
phoronix.comยท1dยท
Discuss: Hacker News
โšกPerformance Tools
Efficient and accurate solution of wind-integrated optimal power flow based on enhanced second-order cone relaxation with rolling cutting plane technique
arxiv.orgยท1d
๐Ÿ“Linear Algebra
Game-Theoretic and Reinforcement Learning-Based Cluster Head Selection for Energy-Efficient Wireless Sensor Network
arxiv.orgยท1d
๐Ÿ•ธ๏ธNetwork Topology
Latent Plan Transformer for Trajectory Abstraction: Planning as Latent Space Inference
arxiv.orgยท1d
๐Ÿ“ŠQuantization
Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack
securityaffairs.comยท12h
๐Ÿ”“Hacking
Deep Learning Model for Amyloidogenicity Prediction using a Pre-trained Protein LLM
arxiv.orgยท1d
๐ŸงฎVector Embeddings
Let's build a Free Chatbot with Streamlit and Gemini AI (Step-by-Step for Beginners)
dev.toยท1dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Firewall Recommendations: Rackmount Device vs. Self-Hosted Software?
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
Loading...Loading more...
AboutBlogChangelogRoadmap