🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📊 Shannon Entropy

Information Bounds, Optimal Coding, Channel Capacity, Compression Limits

Object deserialization attacks using Ruby's Oj JSON parser
hezmatt.org·8h·
Discuss: Hacker News
🛡️CBOR Security
Policy Zones: How Meta enforces purpose limitation at scale in batch processing systems
engineering.fb.com·2d
⚙️Batch Processing
Being optimistic for technology
rubenerd.com·23h·
Discuss: Hacker News
💾vintage computing
Open-Source RISC-V Peripheral Challenge
tinytapeout.com·17h·
Discuss: Hacker News
🔌Single Board PC
Show HN: I built ReplyFast an AI powered tool to write faster and better emails
replyfast.net·1d·
Discuss: Hacker News
🔍BitFunnel
My Heroku Values (2015)
brandur.org·1d·
Discuss: Hacker News
🌳Git Internals
An Engineer's Guide to AI Code Model Evals
addyosmani.com·1d·
Discuss: r/programming, r/webdev
📏Code Metrics
From Envoy to Consul chasing a latency spike across a globally distributed stack
koyeb.com·21h·
Discuss: Hacker News
🏎️Varnish Cache
‘The first time I’d seen fart jokes that were actually funny’: comedians on their cultural awakenings
theguardian.com·2h
📼Tape Linguistics
Effects of variation in system responsiveness on user performance in virtual environments
arxiv.org·1d
📟Terminal Physics
MuseAir hashing algorithm v0.4 released (currently Rust only)
github.com·1d·
Discuss: Hacker News
🔍MinHash Variants
EVOLVE-X: Embedding Fusion and Language Prompting for User Evolution Forecasting on Social Media
arxiv.org·2d
📊Feed Optimization
Enhance Social Media Videos with AI Descriptions
dev.to·2d·
Discuss: DEV
⚖️Feed Ranking
Show HN: Digital Twin Proxy – Turn web browsing into memory for AI agents
github.com·1d·
Discuss: Hacker News
🤖Network Automation
Exploring the Potential of LLMs for Serendipity Evaluation in Recommender Systems
arxiv.org·2d
🎯Recommendation Metrics
Data Scientist vs. AI Engineer: Who Holds the Crown for the Sexiest Job of the 21st Century?
dev.to·1d·
Discuss: DEV
🧪Data science
Exploiting the Overlooked: From Regex Bypasses to Full Source Code Leaks
infosecwriteups.com·1d
💣ZIP Vulnerabilities
Generation of Synthetic Clinical Text: A Systematic Review
arxiv.org·1d
📝Concrete Syntax
DCFFSNet: Deep Connectivity Feature Fusion Separation Network for Medical Image Segmentation
arxiv.org·1d
🌀Hyperbolic Geometry
Machine Learning Fundamentals: gradient descent example
dev.to·1d·
Discuss: DEV
⚡Incremental Computation
Loading...Loading more...
AboutBlogChangelogRoadmap