๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›๏ธ Lakehouse Architecture

Data Lakes, Warehouses, Unified Analytics, Multi-modal Storage

AIโ€™s Double Edge: How AI Expands the Attack Surface & Empowers Defenders
sentinelone.comยท29m
๐Ÿ”AI Detection
Static analysis for pull requests. Another step towards regularity
pvs-studio.comยท7hยท
Discuss: r/programming
๐Ÿ“ŠData Lineage
Reverse Proxy Deep Dive: Why HTTP Parsing at the Edge Is Harder Than It Looks
startwithawhy.comยท5hยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Local-first calendar with tasks and notes
feedback.routine.coยท12hยท
Discuss: Hacker News
๐Ÿ—œ๏ธArchive Compression
AI Slop Might Finally Cure Our Internet Addiction
theatlantic.comยท4hยท
Discuss: Hacker News
๐ŸงญBehavioral Bioinformatics
Ununderstanding โ€“ Intellectual Work in the Age of AI
considerthebulldog.comยท4hยท
Discuss: Hacker News
๐Ÿ”AI Detection
How ChromeOS propelled Korean Air's digital transformation
cloud.google.comยท10h
๐Ÿ—data engineering
The Context Illusion: Why LLMs Don't Know Your Code Like You Think They Do
dev.toยท4hยท
Discuss: DEV
๐Ÿ›ก๏ธMemory Safety
The Future of AI in Software Engineering: Transforming Development from Code Creation to Intelligent Orchestration
dev.toยท16hยท
Discuss: DEV
๐Ÿ”AI Detection
The calculus of variations of the Transformer on the hyperspherical tangent bundle
arxiv.orgยท15h
๐Ÿ”ขNumPy
"With Chainwire, itโ€™s not hope for pickup. Itโ€™s guaranteed placement" - Alon Keren, MarketAcross
hackernoon.comยท10h
๐ŸงŠIceberg Tables
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts
arxiv.orgยท15h
๐Ÿ›ก๏ธMemory Safety
One Step is Enough: Multi-Agent Reinforcement Learning based on One-Step Policy Optimization for Order Dispatch on Ride-Sharing Platforms
arxiv.orgยท15h
๐ŸŽฎReinforcement Learning
We Built a Language Model 14,000,000x Smaller Than GPT3 and Formally Verified It
github.comยท9hยท
Discuss: Hacker News
๐Ÿ“‹Tokei
From Screenshots to Objective-C: A New Era in iOS Development
dev.toยท17hยท
Discuss: DEV
๐Ÿ““Jupyter
Generative Distribution Distillation
arxiv.orgยท15h
๐Ÿ”„Feed Aggregation
Comprehensive Privacy Risk Assessment in Social Networks Using User Attributes Social Graphs and Text Analysis
arxiv.orgยท15h
๐Ÿ”Privacy Engineering
What are the practical building blocks for independent AI agents?
news.ycombinator.comยท11hยท
Discuss: Hacker News
๐Ÿค–AI
How Iโ€™m Building Custom Generative AI โ€“ Step-by-Step Guide (2025)
dev.toยท13hยท
Discuss: DEV
โš™๏ธQuery Compilers
Behind the Scenes: Building My Modular Django Portfolio - PART 1
dev.toยท12hยท
Discuss: DEV
๐Ÿ“‹Tokei
Loading...Loading more...
AboutBlogChangelogRoadmap