๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ eBPF Programs

Kernel Programming, Network Filtering, Performance Monitoring, Security

Analogue Appreciation: For Those I Love
huckmag.comยท3h
๐Ÿ“ผAudio Cassettes
Status update, July 2025
bisco.orgยท5d
๐Ÿ”ŒInterface Evolution
Rethinking devtools: Escaping the Cloud and SaaS trap
lobste.rsยท7hยท
Discuss: Lobsters
โ„๏ธNix Adoption
MathJax v4.0.0 Now Available
mathjax.orgยท9hยท
Discuss: Hacker News
๐Ÿ“„PostScript
Show HN: Limitly โ€“ the easiest way to secure and manage your API keys
limitly.devยท2dยท
Discuss: DEV, Hacker News, r/node
โšกgRPC
Marchat v0.2: Terminal chat with E2E encryption and plugin ecosystem
cod-e-codes.comยท2dยท
Discuss: Hacker News
๐Ÿ“ŸTerminals
Asking Eric: When I reject a bid, shouldnโ€™t the contractor say something? Anything?
mercurynews.comยท5h
๐Ÿ’ปLocal first
The Socio-Economic Model of the AI Era, Part 1: The Internet
newsletter.f2n.coยท2dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Comprehensive Overview of the Identity Management Ecosystem in 2025
guptadeepak.comยท5dยท
Discuss: DEV, Hacker News
๐Ÿ”Capability Systems
How to Create a virtual machine In azure
dev.toยท2dยท
Discuss: DEV
๐Ÿ’ฟProxmox HA
Data Brokers Are Ignoring Privacy Law. We Deserve Better.
eff.orgยท1d
โš–๏ธLegal Compliance
AI is fast-tracking climate research
phys.orgยท3h
๐Ÿค–AI Curation
A single ransomware attack has pushed this business into insolvency
techradar.comยท1d
๐ŸŽซKerberos Exploitation
DDR4 production expected to continue until 2026 โ€” Samsung, SK hynix, and Micron will continue serving industry clients for longer
tomshardware.comยท1h
๐Ÿ”ŒMicrocontrollers
The U.S. and China are engaged in a race over chip development โ€” both countries are racing to build infrastructure
tomshardware.comยท1h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Castle Biosciences, Inc. (CSTL) Q2 2025 Earnings Call Transcript
seekingalpha.comยท1d
๐Ÿ”—Data Provenance
Recognising, Anticipating, and Mitigating LLM Pollution of Online Behavioural Research
arxiv.orgยท1d
๐Ÿ“œDigital Philology
Evading Data Provenance in Deep Neural Networks
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Spatial-Frequency Aware for Object Detection in RAW Image
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Data-Driven Adaptive Second-Order Sliding Mode Control with Noisy Data
arxiv.orgยท1d
โš™๏ธTape Mechanics
Loading...Loading more...
AboutBlogChangelogRoadmap