Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
mhofherr's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82937
posts in
995.8
ms
Loading...
Subscribe
Show HN: The
Librarian
creates artifacts while a model
finishes
its work
librarian.fieldtheory.dev
·
16h
·
Discuss:
Hacker News
📈
Productivity
Data Protection Authority in hot water: personal info leaked
amidst
security
oversight
nltimes.nl
·
19h
🛡
Cyber Security
Startup businesses need to take
cybersecurity
seriously
betanews.com
·
2d
🛡
Cyber Security
The Data
Pipeline
for
Superintelligence
Starts with Your Screen
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🧠
PKM Systems
Alibaba unveils
Qwen3-Coder-Next
AI model for coding agents and local development tasks
alternativeto.net
·
1d
🧠
PKM Systems
I
Gave
My
Diary
to AI (A Second Brain Case Study)
youtube.com
·
1d
🧠
PKM Systems
ML-LIB
: Machine Learning Library Proposed For The Linux Kernel
phoronix.com
·
16h
·
Discuss:
Hacker News
🧠
PKM Systems
In artificial intelligence the world is
always
what we want it to be and it is so before we act.
brunomacaes.substack.com
·
1h
·
Discuss:
Substack
🧠
PKM Systems
Clifford
Kolmogorov-Arnold
Networks
arxiv.org
·
1d
🧠
PKM Systems
Building Highly Efficient Inference System for
Recommenders
Using
PyTorch
pytorch.org
·
1d
·
Discuss:
Hacker News
🧠
PKM Systems
Claude's new
capabilities
linkedin.com
·
4h
📈
Productivity
The
gentle
obsolescence
benn.substack.com
·
15h
·
Discuss:
Substack
🧠
PKM Systems
Ransomware
gangs
focus on winning hearts and
minds
computerweekly.com
·
3d
·
Discuss:
Hacker News
🛡
Cyber Security
The Shadow Campaigns:
Uncovering
Global
Espionage
lemmy.ml
·
21h
🛡
Cyber Security
CCIE Security
DOO1/DOO2
, Stable Pass! & CCIE Security
Design1/Design2/Design3
, Stable Pass!
dev.to
·
1d
·
Discuss:
DEV
🛡
Cyber Security
The
Intent-Verification
Gap in CI/CD: Why
Authentication
Fails Under Real Attacks
dev.to
·
4h
·
Discuss:
DEV
🛡
Cyber Security
Is Your Machine Learning
Pipeline
as Efficient as it Could Be?
kdnuggets.com
·
23h
📈
Productivity
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
KGLAMP
: Knowledge Graph-guided Language model for Adaptive Multi-robot Planning and
Replanning
arxiv.org
·
2d
🧠
PKM Systems
How
recruitment
fraud turned cloud
IAM
into a $2 billion attack surface
venturebeat.com
·
1d
🛡
Cyber Security
Explainable Liability
Assignment
in Autonomous Vehicle Accidents: A Data‑Driven AI Framework for Legal
Remedy
Optimization **Abstract** Autonomous vehicles (...
freederia.com
·
19h
🧠
PKM Systems
Loading...
Loading more...
« Page 11
•
Page 13 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help