๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Type Safety

Memory Safety, Rust Ownership, Linear Types, Resource Management

Fitment is Solved. The Next Million-Dollar Problem is Ranking.
shaped.aiยท1d
๐Ÿ”—Topological Sorting
Make any website load faster with 6 lines of HTML
docuseal.comยท1dยท
Discuss: Hacker News, r/webdev
๐ŸŒWeb Standards
Proximity Audio/Video Technology
thegamer.comยท23hยท
Discuss: Hacker News
๐ŸบGaming Archaeology
When Memcpy Betrays You: A Lesson in Overlapping Buffers and Ancient Toolchains
blog.mycal.netยท6dยท
Discuss: Hacker News
๐Ÿง Separation Logic
Thoughts on an open source deployment platform?
zeitwork.comยท1dยท
Discuss: Hacker News
๐ŸงฑImmutable Infrastructure
Aoostar WRT Max - great specs, shit quality
youtu.beยท1dยท
Discuss: r/homelab
๐ŸŒก๏ธPreservation Entropy
Inside TSMC, the $1 Trillion Ghost Foundry Behind Nvidia's Crown
howardyu.substack.comยท1dยท
Discuss: Substack
๐Ÿ–ฅ๏ธTerminal Renaissance
How Runtime Hardening Enforces AI, Cloud Native Security
thenewstack.ioยท4d
๐Ÿ›ก๏ธeBPF Security
Why the Uber Rich Are Rushing Into Tokenised Assets โ€” And What It Means for You
hackernoon.comยท1d
๐Ÿ”BitFunnel
Car theft with transponder: Mercedes, Porsche escape class action lawsuit
heise.deยท23h
๐Ÿ“œProof Carrying Code
Comparing Normalizing Flows with Kernel Density Estimation in Estimating Risk of Automated Driving Systems
arxiv.orgยท2d
๐Ÿง Machine Learning
Linux's Lockdown LSM Back To Being Maintained For Restricted Computing
phoronix.comยท1d
๐Ÿ”eBPF
Reverse engineering some updates to Claude
simonwillison.netยท1d
๐ŸบZIP Archaeology
Understanding the KNN Algorithm: Finding Your Nearest Neighbors
dev.toยท4hยท
Discuss: DEV
๐Ÿ—‚๏ธVector Search
Charting the Course: Future Innovations for NFT Marketplace dApp
hackernoon.comยท2d
๐ŸŒŠStreaming Systems
FGFP: A Fractional Gaussian Filter and Pruning for Deep Neural Networks Compression
arxiv.orgยท2d
๐Ÿ“ŠQuantization
Security Tensors as a Cross-Modal Bridge: Extending Text-Aligned Safety to Vision in LVLM
arxiv.orgยท4d
๐Ÿค–Advanced OCR
The Double-Edged Sword of AI in Software Engineering: Balancing Power and Peril
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
(1) Fitting hierarchical models in genetics, (2) A Stan model that runs faster with with 400,000 latent parameters, (3) Super-scalable penalized maximum likelih...
statmodeling.stat.columbia.eduยท1d
๐ŸงฎKolmogorov Complexity
Invisible Architectures of Thought: Toward a New Science of AI as Cognitive Infrastructure
arxiv.orgยท1d
๐ŸŒCultural Algorithms
Loading...Loading more...
AboutBlogChangelogRoadmap