๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“Ÿ Vintage Protocols

Serial Communications, Parallel Ports, Historical Networking, Legacy Interfaces

Persistent Risk: XZ Utils Backdoor Still Lurking in Docker Images
binarly.ioยท2d
๐Ÿ“ฆContainer Security
Haskell Crash Course
yager.ioยท2d
๐Ÿ”—Lisp
Why Build Local-First Apps
dinoki.aiยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Dog May Stop Loving You
gardnermcintyre.comยท3dยท
Discuss: Hacker News
๐ŸŒก๏ธPreservation Entropy
Corp training benefit used for lab hw purchase?
picocluster.comยท1dยท
Discuss: r/homelab
๐Ÿ”ŒSingle Board PC
I used Microsoft's elusive 'Surface Neo' dual-screen Windows PC โ€” its biggest-ever hardware failure
windowscentral.comยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธModern Terminals
Microchip Technology Incorporated (MCHP) Presents at KeyBanc Technology Leadership Forum Conference Transcript
seekingalpha.comยท1d
๐Ÿ”PAKE Protocols
Samsung's biggest rival and Sandisk have come together to standardize High Bandwidth Flash memory - which could mean better AI performance for everyone
techradar.comยท2d
๐Ÿ–ฅ๏ธHardware Architecture
Quantum Inspired Legal Tech Environmental Integration for Emergency Pharmaceutical Logistics with Entropy Modulated Collapse and Multilevel Governance
arxiv.orgยท2d
๐Ÿ”Quantum Security
Switchless Motorized Rotating Display Stand
hackster.ioยท1d
โš™๏ธDIY Electronics
Recent cross-research on LLM and RL on ArXiv
github.comยท4dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
A Love Letter to Prototype Zero
hackaday.comยท6d
โš™๏ธDIY Electronics
"VPNs are not kryptonite of age assurance" โ€“ Age verification experts explain why governments donโ€™t need to ban VPNs
techradar.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Software Engineering Laws - Human Factors
leadership.gardenยท23h
๐Ÿง Intelligence Compression
The backlash over GPT-5 shows people are getting hooked on specific AI models
businessinsider.comยท23h
๐Ÿ”ŒInterface Evolution
The Memory Architects - Chapter 11: The Infinite Garden
dev.toยท9hยท
Discuss: DEV
โฐTime Crystals
Google Jules is Vulnerable To Invisible Prompt Injection
embracethered.comยท7h
๐Ÿ”“Hacking
Adaptive Learning for IRS-Assisted Wireless Networks: Securing Opportunistic Communications Against Byzantine Eavesdroppers
arxiv.orgยท3d
๐Ÿง Machine Learning
AI Weekend Projects That Slash Repetitive Work
dev.toยท3dยท
Discuss: DEV
๐Ÿ“กRSS Automation
Why we open sourced our MCP server, and what it means for you
github.blogยท3dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Loading...Loading more...
AboutBlogChangelogRoadmap