๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“‹ Swedish Standards

Nordic Protocols, Scandinavian Computing, SS-EN Standards, Regional Specifications

The Digital Rights in Asia-Pacific Assembly (DRAPAC) 2025
accessnow.orgยท2h
๐Ÿ“‹PREMIS Events
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comยท5h
๐ŸšจIncident Response
Bridging tech, activism, and the future of software archival
softwareheritage.orgยท6h
๐Ÿ”“Open Source Software
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท3h
๐Ÿ’ฃZIP Vulnerabilities
Generating C functions and prototypes using macros โ€“ part 2
subethasoftware.comยท14h
๐Ÿฆ€Rust Macros
First absolute superconducting switch developed in a magnetic device
phys.orgยท22hยท
Discuss: Hacker News
โš›๏ธQuantum Tape
Uncertain< T >: A First-Order Type for Uncertain Data (2014)
microsoft.comยท2dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
When Switches Flood LLDP Traffic
blog.ipspace.netยท1dยท
Discuss: Hacker News
๐Ÿ“กNetwork Protocol Design
Legal Doublet (Wikipedia)
en.wikipedia.orgยท1dยท
Discuss: Hacker News
๐Ÿ“œText Collation
The coming war on general-purpose computing (2012)
boingboing.netยท2hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
V Language: Simplicity Made Sexy. A Gen-Z Blend of Go and Rust
medium.comยท2hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Types of Dimensions in a Data Warehouse (Beginnerโ€™s Guide)
dev.toยท11hยท
Discuss: DEV
๐Ÿ“‡Indexing Strategies
Clever โ€˜light switchโ€™ breakthrough could make hyperscale networks 1000x faster, just in time for AGI and superintelligence
techradar.comยท22h
๐Ÿ–ฅ๏ธModern Terminals
A Dynamic Approach to Collaborative Document Writing
arxiv.orgยท12h
๐Ÿ”—Parser Combinators
A Laplace diffusion-based transformer model for heart rate forecasting within daily activity context
arxiv.orgยท12h
๐ŸŽ™๏ธWhisper
Reverse Engineered Raspberry Pi Compute Module 5
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒSingle Board PC
Go module for brute force attacks on SSH steals the accesses found
heise.deยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Exactly-Once Processing Across Kafka and Databases: Using Kafka Transactions + Idempotent Writes
medium.comยท2dยท
Discuss: r/programming
๐ŸŒŠApache Kafka
BSD Now 625
discoverbsd.comยท1d
๐Ÿ”ŒOperating system internals
Make a Voltage Divider in typeCAD
hackster.ioยท2h
โš™๏ธDIY Electronics
Loading...Loading more...
AboutBlogChangelogRoadmap