🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📋 Swedish Standards

Nordic Protocols, Scandinavian Computing, SS-EN Standards, Regional Specifications

Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.com·1d
👁️Perceptual Hashing
Andrés Vázquez: ‘90% of technological problems can be solved with tools that have been around for decades’
blog.okfn.org·1d
⚖️Lossy Compression Ethics
Certificate Transparency - Part 3 - Operations
ipng.ch·3d
🔒Hardware Attestation
Getting Started With Kubevirt
codeofconnor.com·2d
🏠HomeLab
Python 3.14 Preview: Lazy Annotations
realpython.com·12h
λLambda Formalization
Can AI be trusted in a medical emergency? Analyzing Healthbench
counselhealth.com·8h·
Discuss: Hacker News
⚡Proof Automation
Many hate on Object-Oriented Programming. But some junior programmers seem to mostly echo what they've heard experienced programmers say. In this blog post I tr...
zylinski.se·1d·
Discuss: Hacker News, r/programming
🔩Systems Programming
Evaluation of Hashing Algorithms Ascon, SHA256, SHA512 and BLAKE3 on a Cortex M7
aa55.dev·3d·
Discuss: Hacker News
🦾ARM Cortex-M
Drama Model Inference Efficiency Boosted by 1.7x-2.3x
pytorch.org·1d·
Discuss: Hacker News
🚀SIMD Text Processing
FortMajeure: Authentication Bypass in FortiWeb
pwner.gg·12h·
Discuss: Hacker News
🛡️WASM Security
Helping people when they need it most
openai.com·1d·
Discuss: Hacker News, r/ChatGPT
🎯Threat Hunting
TypeScript 5.0: Explore New Features & Updates
dev.to·1d·
Discuss: DEV
🎯Gradual Typing
Parlant - Renovation AI Open-Source framework
dev.to·1d·
Discuss: DEV
✨Effect Handlers
GhostBSD 25.02-R14.3p2 Released with Gershwin Desktop Preview
discoverbsd.com·1d
🔌Operating system internals
Chatting with Unmesh about building language with LLMs
martinfowler.com·1d
💻Programming languages
Measuring Large Language Models Dependency: Validating the Arabic Version of the LLM-D12 Scale
arxiv.org·1d
🔍Information Retrieval
The EU’s Cyber Resilience Act: Redefining Secure Software Development
devops.com·1d
🔓Open Source Software
OpenBSD Hackathon Leipzig 2025: Qt6 Fixes, KDE PIM, and C++26 Updates
discoverbsd.com·2d
🔍eBPF
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.org·22h
🔒Language-based security
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.com·1d
📐Geometric Hashing
Loading...Loading more...
AboutBlogChangelogRoadmap