🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Algorithms
How to Speak Like a Calm Leader, Even Under Fire
projectmanagement.com·14h·
Discuss: Hacker News
💻Programming
We all notice this at the Airport
sivunq.github.io·4d·
Discuss: Hacker News
💻Programming
Gambling or investing? In America, the line is increasingly blurred
economist.com·4d·
Discuss: Hacker News
💻Programming
A geography game that never happened – every photo is AI, every memory is yours
timeguessr.online·6d·
Discuss: Hacker News
📐Computational geometry
From RMSProp to AdamW: The Optimizer Evolution Story
naskovai.substack.com·6d·
Discuss: Substack
🧩Procedural Generation
I Made a Configurable Rate Limiter Because APIs Can't Say 'Chill'
beyondthesyntax.substack.com·6d·
Discuss: Substack
💻Programming
Fake accounts drove the DeepSeek AI hype and distorted markets
evai.ai·3d·
Discuss: Hacker News
🧱Data structures
Trump administration cancels $679M for offshore wind projects
cnbc.com·3d·
Discuss: Hacker News
🖼️Rendering
The Struggle of Wrapping a JavaScript Game for Desktop
jslegenddev.substack.com·6d·
Discuss: Substack
💻Programming
China Warns Against ‘Disorderly Competition’ in Booming AI Race
bloomberg.com·3d·
Discuss: Hacker News
🧩Procedural Generation
Science research gets more engagement on Bluesky than X, study finds
theguardian.com·18h·
Discuss: Hacker News
🦀Rust
"Passport" for Web Agents: Web Bot Auth
developers.cloudflare.com·4d·
Discuss: Hacker News
💻Programming
Why n8n gives AI features away for free
getlago.substack.com·3d·
Discuss: Substack
💻Programming
It's time for you to contribute to the Climate Commons
climatedrift.substack.com·4d·
Discuss: Substack
📐Computational geometry
Intentional Risk Management
leadinginproduct.com·6d·
Discuss: Hacker News
🏗️Computer-aided design
Google’s AI model just nailed the forecast for the strongest Atlantic storm this year
arstechnica.com·6d·
Discuss: Hacker News
📐Computational geometry
Open Source is one person
opensourcesecurity.io·5d·
Discuss: DEV, Lobsters, Hacker News
💻Programming
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
arxiv.org·5d
📐Computational geometry
When technology is not enough: Insights from a pilot cybersecurity culture assessment in a safety-critical industrial organisation
arxiv.org·4d
🏗️Computer-aided design
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift
cloud.google.com·6d·
Discuss: Hacker News, Hacker News
🦀Rust
Loading...Loading more...
AboutBlogChangelogRoadmap