🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ›οΈ Swedish Tech History

SAAB Computer, Luxor ABC, Ericsson, Datasaab D2, Nordic Computing

Fairphone (Gen. 6) is a sustainable, repairable 6.31-inch Android 15 smartphone with Snapdragon 7s Gen 3 SoC
cnx-software.comΒ·15h
πŸ”ŒInterface Evolution
EXCLUSIVE DEAL β€” Save up to 76%, get a free Amazon voucher and a bonus four months free of NordVPN
space.comΒ·1d
πŸ΄β€β˜ οΈPiracy
Introducing S21 Spotlight Sessions: Try The Tools. Skip The Sales Pitch.
forensicfocus.comΒ·6h
πŸ’ΏOptical Forensics
Google AI exec: β€œThe mistake would be thinking this is hype.”
freethink.comΒ·22h
πŸŒ€Brotli Internals
Windows killed the Blue Screen of Death
techcrunch.comΒ·33m
πŸ”“Hacking
SpaceX showed us path to profit for quantum computing, says IQM CEO
thenextweb.comΒ·1d
βš›οΈQuantum Tape
Comprehensive Comparison of Algorithmic Trading Platforms
jonathankinlay.comΒ·1dΒ·
Discuss: Hacker News
πŸ”BitFunnel
Ossification and the Internet
potaroo.netΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Network Archaeology
GenAI paradox: exploring AI use cases | McKinsey
mckinsey.comΒ·14h
πŸ”²Cellular Automata
Interview with Jon Gjengset: Defending Democracies with Rust
filtra.ioΒ·1dΒ·
Discuss: Hacker News
πŸ¦€Embedded Rust
Challenging projects every programmer should try
austinhenley.comΒ·5hΒ·
Discuss: Hacker News
πŸ“Compiler Design
Is the window for generative AI adoption closing for companies?
techradar.comΒ·11h
🌊Stream Processing
NetApp warns AI race will be won on data infrastructure, not hype
blocksandfiles.comΒ·1dΒ·
Discuss: Hacker News
πŸ‘οΈObservatory Systems
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Build a High-Performance Crypto Rankings API with Go + Inngest + Redis in 25 Minutes
dev.toΒ·1hΒ·
Discuss: DEV
πŸ”BitFunnel
5 Ways to Automate Security and Compliance in a Cloud-First World
hackernoon.comΒ·6h
πŸ”“Hacking
Industrial Energy Disaggregation with Digital Twin-generated Dataset and Efficient Data Augmentation
arxiv.orgΒ·16h
🧠Machine Learning
Hackers are using fake Zoom apps to steal your data and your cryptowallet - here's how to stay safe
techradar.comΒ·31m
πŸ”“Hacking
Why I don't ride the AI Hype Train
mertbulan.comΒ·13hΒ·
Discuss: Hacker News
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
Unlocking the Cloud: Your Essential Guide to IaaS, PaaS, and SaaS Models
dev.toΒ·1dΒ·
Discuss: DEV
πŸ–₯️Self-hosted Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap