๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โ„ nix
Mandelbrot area and escape times
johndcook.comยท9h
๐Ÿ“Mathematical Art
DENTSPLY SIRONA Inc. (XRAY) Presents At Morgan Stanley 23rd Annual Global Healthcare Conference (Transcript)
seekingalpha.comยท5h
๐Ÿ”—Data Provenance
Running for cover
aardvark.co.nzยท11h
๐Ÿ“ฐFeed Readers
Jakub and Szymon
blog.samaltman.comยท5hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
Tell me about Macrium and other backup software when you don't have an optical drive.
forums.anandtech.comยท5h
๐ŸŽฎCartridge Dumping
What does the government think an algorithm is?
tommorris.orgยท2dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
SQLite Is Open-Source, Not Open-Contribution
sqlite.orgยท2dยท
Discuss: Hacker News
๐Ÿ’พSQLite
Log Your Scam Attempts Here
forums.anandtech.comยท2d
๐ŸŽซKerberos Attacks
Eight-year-old gaming PC with Nvidia GTX 1080 found in the trash room gets a second life โ€” offered a substantial upgrade to the finder despite age
tomshardware.comยท1d
๐Ÿ•น๏ธRetro Gaming
How can I write a C++/WinRT IAsyncOperation<T> where T is not a Windows Runtime type?, part 2
devblogs.microsoft.comยท4d
๐ŸŽฏEmulation Accuracy
Retrotechtacular: The Noisy Home Computer from 1967
hackaday.comยท3h
๐Ÿ’พvintage computing
Mobile Phone Sensor-based Nigerian Driving Dataset to Detect Alcohol-influenced Behaviours
arxiv.orgยท1h
๐Ÿ“ฑQR Archaeology
Automated Anomaly Detection in Network Traffic via Multi-Variant Temporal Bayesian Networks
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธNetwork Forensics
Bootstrapping Task Spaces for Self-Improvement
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Deep Learning-driven Community Resilience Rating based on Intertwined Socio-Technical Systems Features
arxiv.orgยท1h
๐Ÿง Machine Learning
AWS Weekly Roundup: AWS Transform, Amazon Neptune, and more (September 8, 2025)
aws.amazon.comยท12h
๐ŸŒŠStreaming Systems
Predictive Maintenance in Semiconductor Fabrication via Multi-Modal Anomaly Detection and Reinforcement Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Anonforce โ€” TryHackMe Walkthrough | Complete Guide to Boot2Root
infosecwriteups.comยท18h
๐Ÿ’ฃZIP Vulnerabilities
A Fine-Grained Attention and Geometric Correspondence Model for Musculoskeletal Risk Classification in Athletes Using Multimodal Visual and Skeletal Features
arxiv.orgยท1h
๐ŸŒ€Differential Geometry
Enhanced Nanocrystal Synthesis via Machine Learning-Driven Acoustic Cavitation Control
dev.toยท5hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Loading...Loading more...
AboutBlogChangelogRoadmap