๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โš™๏ธ TLA+

Specification Language, Distributed Systems, Temporal Logic, System Modeling

CVE-2024-12029 โ€“ InvokeAI Deserialization of Untrusted Data vulnerability
offsec.comยท20h
๐ŸŒWASI
AwesomeAssertions/AwesomeAssertions
github.comยท1d
โœ…Format Verification
NIH Is Far Cheaper Than The Wrong Dependency
lewiscampbell.techยท13hยท
Discuss: Lobsters, Hacker News
๐Ÿ“Code Metrics
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.comยท2dยท
Discuss: Hacker News
๐ŸŒWASI
A Wide Reduction Trick (2022)
words.filippo.ioยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸŒณArchive Merkle Trees
Differentiable Programming for Learnable Graphs: Optimizing LLM Workflows W DSPy
viksit.substack.comยท4dยท
Discuss: Substack
โšกIncremental Computation
How to avoid that your post about AI helps the hype
hidde.blogยท43mยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Vertex-Guided Redundant Constraints Identification for Unit Commitment
arxiv.orgยท3d
๐Ÿ“ˆLinear programming
Claude Code Unleashed
ymichael.comยท2dยท
Discuss: Hacker News
โšกProof Automation
Compliance is evolving โ€” Is your resilience ready?
techradar.comยท6h
โš–๏ธLegal Compliance
How I Got 100/100 From GPT-4, Gemini, Grok, and Moreโ€”Using Just a .txt File
dev.toยท1dยท
Discuss: DEV
โš”๏ธLean Tactics
The Rise of Agentic AI: How Autonomous Systems Are Transforming Industries
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Why AI Agent Implementations Keep Failing (and the Patterns That Work)
davidlambauer.deยท4dยท
Discuss: Hacker News
โšกProof Automation
๐Ÿง  When Will ChatGPT-5 Be Released? (July 2025 Update)
dev.toยท6hยท
Discuss: DEV
๐Ÿ–ฅ๏ธTerminal Renaissance
My Participation in the METR AI Productivity Study
domenic.meยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
How to Develop a Web Application for 10K+ Users, Heavily Performing I/O-Bound Operations
dev.toยท58mยท
Discuss: DEV
๐ŸŒŠStream Processing
Post-Quantum Cryptography in Kubernetes
kubernetes.ioยท13h
๐Ÿ”Quantum Security
Iterative Augmentation with Summarization Refinement (IASR) Evaluation for Unstructured Survey data Modeling and Analysis
arxiv.orgยท1d
โš™๏ธCompression Benchmarking
Improving Data and Parameter Efficiency of Neural Language Models Using Representation Analysis
arxiv.orgยท1d
๐ŸงฎKolmogorov Complexity
Deep Generative Methods and Tire Architecture Design
arxiv.orgยท1d
๐ŸŒ€Riemannian Computing
Loading...Loading more...
AboutBlogChangelogRoadmap