๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Web Archives

WARC Format, Internet Archive, Browser History, Digital Heritage

Weird SEGA facts
anderegg.caยท2d
๐ŸบGaming Archaeology
RadioSport SDR: Portable Receiver Software for RTL-SDR
rtl-sdr.comยท3d
๐Ÿ“ปHomebrew Protocols
Answer: Best ways to do just-in-time learning. Part 1.
searchresearch1.blogspot.comยท2dยท
Discuss: searchresearch1.blogspot.com
๐Ÿ”ฒCellular Automata
My Workflow to Review Articles with LLMs
binwang.meยท3d
โšกProof Automation
Barber, Sian - Beyond the BBFC : Local and regional film censorship in the UK / Sian Barber.
libris.kb.seยท6d
๐Ÿ“ฆMKV Containers
AI Doesn't Lighten the Burden of Mastery; AI Makes It Easy to Stop Valuing It
playtechnique.ioยท14hยท
Discuss: Hacker News
โšกProof Automation
An Accurate and Rapidly Calibrating Speech Neuroprosthesis
nejm.orgยท3dยท
Discuss: Hacker News
๐ŸŽ›๏ธCassette DSP
PSA: Update your Plex Media Server now
techspot.comยท3d
๐ŸŒWebRTC Archives
Raspberry Pi releases smaller five-inch Touch Display 2 โ€” lower in price, same resolution as larger model
tomshardware.comยท50m
๐Ÿ”ŒSingle Board PC
The Closed Internet Protocol
mirz.aiยท5dยท
Discuss: Hacker News
๐Ÿง…Tor Networks
I tested the TP-Link EAP725-Wall and found the access point perfect for office deployments, but only up to a point
techradar.comยท18h
๐Ÿ“ŠHomelab Monitoring
Native capture: why itโ€™s non-negotiable for modern compliance teams
techradar.comยท3d
โš–๏ธLegal Compliance
China and Britain shared a mission to fight aggression and fascism. And we can work together today | Zheng Zeguang
theguardian.comยท2d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
How Age Verification Laws Targeting Online Porn Could Be (And Should Be) Viewed As A Labor Rights Issue
techdirt.comยท2d
๐Ÿ›กCybersecurity
Firebird database: DoS vulnerabilities and potentially unauthorized access
heise.deยท12m
๐Ÿ›ก๏ธCBOR Security
Saturday Extra: Raindrops
hamatti.orgยท2d
๐Ÿ“ฐFeed Readers
[Tech Pills] Frontend concurrency control (with S3 file upload) A practical guide to implementing sequential, batched, and streamed uploads with concurrency pri...
blog.codeminer42.comยท3d
๐ŸŒŠStreaming Systems
Sniffing and Injecting on 5G NR
github.comยท3dยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
Scalable Failure Mode Prediction via Multi-Modal Data Fusion and Deep Temporal Analysis in Aging Infrastructure
dev.toยท4dยท
Discuss: DEV
โš™๏ธProof Engineering
Training-Free Anomaly Generation via Dual-Attention Enhancement in Diffusion Model
arxiv.orgยท3h
๐Ÿ”Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap