๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ค Unicode Normalization

Canonical Equivalence, Compatibility Characters, Text Processing, internationalization

Is sumo becoming a victim of its own popularity?
japantimes.co.jpยท19h
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Advice for Tech Non-Profits
mitchellh.comยท19h
โš–๏ธLossy Compression Ethics
Nocs Provisions Zero Tube 10x25 waterproof monocular review
space.comยท9h
๐Ÿ”ฌProjection Optics
How Harry Potter Fans Are Driving the Romantasy Trend
nytimes.comยท3h
๐ŸฐManuscript Networks
Pharmaceutical firm Inotiv investigating ransomware attack that disrupted operations
cybersecuritydive.comยท3h
๐Ÿ”“Hacking
microsoft/magentic-ui
github.comยท4d
๐Ÿค–Archive Automation
7 SQL Interview Questions Most of Freshers Fail
dev.toยท1dยท
Discuss: DEV
๐Ÿ—ƒ๏ธDatabase Forensics
Librum-Reader/Librum
github.comยท4d
๐Ÿ”“Open Source Software
Title: The Unseen Impact of Nighttime Artificial Light on Brain Function, Mood, and Metabolism
dev.toยท19hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Why Some Smells Are Pleasant and Others Are Off-Putting, according to Science
scientificamerican.comยท1d
๐ŸŒก๏ธPreservation Physics
Vladimir Putin now has little choice but to agree to talks
the-independent.comยท23h
๐Ÿ“ABNF Parsing
Neil Young gives up Facebook and Instagram because of Meta's rampant AI chatbots
heise.deยท13h
๐Ÿ“กRSS
No escape from AI now - Microsoft is shoving Copilot into every Excel cell
techradar.comยท1d
๐Ÿ”—Concatenative Languages
๐Ÿš€ Synthetic Data: The Next Frontier for Data Engineers
dev.toยท3hยท
Discuss: DEV
๐ŸŽ“Academic Torrents
Google's New Pixel Watch 4 Is the Most Stylish Smartwatch in Town
lifehacker.comยท3h
๐Ÿ—œ๏ธLZW Variants
UAV-VL-R1: Generalizing Vision-Language Models via Supervised Fine-Tuning and Multi-Stage GRPO for UAV Visual Reasoning
arxiv.orgยท2d
๐Ÿ“ŠQuantization
Introducing r/OpenAIML
dev.toยท1dยท
Discuss: DEV
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Emacs elevator pitch
xenodium.comยท19h
๐Ÿ“ŸTerminals
OWASP Top 10 CI/CD Security Risks & How to Fix Them
boostsecurity.ioยท1d
๐Ÿ›ก๏ธWebAssembly Security
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
darkreading.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap