🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Swedish Computing

Datasaab, Luxor ABC, Swedish Tech History, Nordic Innovation, ASEA Computers

Today in Sweden: A roundup of the latest news on Wednesday
thelocal.seΒ·8h
πŸ‡ΈSweden
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteΒ·19hΒ·
Discuss: Hacker News
🧲RISC-V Archaeology
Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toΒ·7hΒ·
Discuss: DEV
⛏️Archive Mining
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·8h
πŸ›οΈMainframe Archaeology
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comΒ·2h
🎫Kerberos Attacks
Informatics student awarded Glushko Dissertation Prize for a thesis about honeybee dance
informatics.ed.ac.ukΒ·4h
πŸ”²Cellular Automata
Denmark Switches from Microsoft to LibreOffice and Linux
digitrendz.blogΒ·3hΒ·
Discuss: Hacker News
πŸ‡©πŸ‡°Danish Computing
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·17h
πŸ”—Data Provenance
IBM Pushes for More Collaboration Between Security, Governance
darkreading.comΒ·1d
πŸ”HSM Integration
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·45m
πŸ”¬Archive Forensics
AI, peer review and the human activity of science
nature.comΒ·3h
πŸ”¬Academic Search
What LLMs Know About Their Users
schneier.comΒ·3h
πŸ’»Local LLMs
Cybersecurity Basics: We're Cyber Essentials Recertified in 2025 (How You Can Do It Too)
thoughtbot.comΒ·14h
πŸ›‘Cybersecurity
Software Heritage: The next chapter
softwareheritage.orgΒ·1h
πŸ›οΈOAIS Implementation
A computer worth 7k$ and the question if it had internet
berti92.github.ioΒ·42mΒ·
Discuss: Hacker News
πŸ”“Hacking
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comΒ·46mΒ·
Discuss: Hacker News
πŸ“‹DFDL
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·2h
πŸ”Quantum Security
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.orgΒ·4h
πŸ”“Hacking
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·4h
🎯Threat Hunting
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.orgΒ·6m
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap