🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🐚 Shell Calculus

Unix Philosophy, Pipeline Algebra, Process Composition, Command Semantics

Thoughts on creating a tracking pointer class, part 3: Using a std::vector
devblogs.microsoft.com·17h
🔄Lens Laws
Good Justifications Write Themselves
oblique.security·1d·
Discuss: Hacker News
🔐Capability Systems
I couldn’t wait until the end of the year to talk about my favorite games of 2025, so here are seven I can’t recommend enough
techradar.com·19h
🏺Gaming Archaeology
Show HN: Building a web search engine from scratch with 3B neural embeddings
blog.wilsonl.in·1d·
Discuss: Lobsters, Hacker News
🔍Semantic Search
What If We Built Legal Systems Like We Build Everything Else?
philosophermaker.substack.com·1d·
Discuss: Substack
🧲Magnetic Philosophy
One network service policy architecture
infoq.com·1d·
Discuss: Hacker News
🕸️Mesh Networks
Microsoft's Patch Tuesday baker's dozen: 12 critical bugs plus a SharePoint RCE
theregister.com·1d
🔓Hacking
Descriptive Statistics in Data Science: Your First Step in Analysis
dev.to·1d·
Discuss: DEV
🧪Data science
SAP fixed 26 flaws in August 2025 Update, including 4 Critical
securityaffairs.com·1d
💣ZIP Vulnerabilities
Learning Generalizable and Efficient Image Watermarking via Hierarchical Two-Stage Optimization
arxiv.org·1d
💧Digital Watermarking
GazeLT: Visual attention-guided long-tailed disease classification in chest radiographs
arxiv.org·3h
🕸️Algebraic Topology
U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·6h
🔓Hacking
Enhanced Algal Biofuel Production via Dynamic Lipid Extraction & Enzymatic Transesterification
dev.to·5h·
Discuss: DEV
☕Precision Brewing
LEAVES: Learning Views for Time-Series Biobehavioral Data in Contrastive Learning
arxiv.org·3h
📊Learned Metrics
Vibe coding is not the AI utopia it seems
northpodie.blogspot.com·4d·
Discuss: Hacker News
🌀Brotli Internals
Real-World Examples of Success in AI Software Development
dev.to·3d·
Discuss: DEV
⚡Proof Automation
Energy Experience Design
arxiv.org·3d
🔲Cellular Automata
Automated Differential Privacy Enforcement via Adaptive Kernel Density Estimation (ADPE-KDE) in Streaming Sensor Data
dev.to·2d·
Discuss: DEV
🛡️Differential Privacy
Automated BIM Clash Resolution via Generative Adversarial Networks & Reinforcement Learning
dev.to·1d·
Discuss: DEV
🏺Computational Archaeology
Scalable Bayesian Optimization for Enhanced Process Analytical Technology (PAT) in Rare Disease Manufacturing
dev.to·1d·
Discuss: DEV
☕Precision Brewing
Loading...Loading more...
AboutBlogChangelogRoadmap