๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Privacy Engineering

Differential Privacy, Data Anonymization, Secure Computation, Privacy Preserving

Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.comยท12h
๐Ÿ›ก๏ธMemory Safety
Computer-vision, Pi3 and losing hackathons
mtende.blogยท15hยท
Discuss: Hacker News, r/programming
๐ŸบData Archaeology
Pearson and Google Bring AI to Classrooms: Can L&D Copy That Model?
demodazzle.comยท6hยท
Discuss: DEV
๐ŸคCollaborative Research
PyPI Prohibits inbox.ru email domain registrations
blog.pypi.orgยท16hยท
Discuss: Hacker News
๐Ÿ—data engineering
Efficient WebSocket Server-Side Processing(4060)
dev.toยท7hยท
Discuss: DEV
๐ŸŒŠStream Processing
Kiro and the future of AI spec-driven software development
kiro.devยท21hยท
Discuss: Lobsters, Hacker News
๐Ÿ“‹Tokei
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.orgยท7h
๐ŸงญBehavioral Bioinformatics
A collective intelligence model for swarm robotics applications
nature.comยท9h
๐ŸœSwarm Intelligence
Major breach at medical billing giant sees data on 5.4 million users stolen - here's what we know
techradar.comยท23hยท
Discuss: r/technews
โฑ๏ธReal-time Analytics
Python Fundamentals: cProfile
dev.toยท23hยท
Discuss: DEV
๐Ÿ“‹Tokei
High-Performance Routing System Design and Implementation(0858)
dev.toยท9hยท
Discuss: DEV
๐ŸปPolars
Cross-Platform Multi-Channel Attribution in Marketing: Balancing Costs and Results Across Devices
dev.toยท4hยท
Discuss: DEV
๐Ÿ”„Feed Aggregation
Understanding SOLID once and for all | Part 02 - (OCP)
dev.toยท13hยท
Discuss: DEV
๐ŸงŠIceberg Tables
Ex-OpenAI engineer pulls the curtain back on a chaotic hot mess
theregister.comยท18hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservability
FADE: Adversarial Concept Erasure in Flow Models
arxiv.orgยท7h
๐Ÿ—data engineering
Data and analytics reimagined with Terraform and DevOps principles
dev.toยท17hยท
Discuss: DEV
๐Ÿ—data engineering
IDS with Machine Learning: Simulating Cyberattacks (โš”๏ธ Simulating Attacks. Strengthening Defenses)
dev.toยท3hยท
Discuss: DEV
๐Ÿ”AI Detection
CoCre-Sam (Kokkuri-san): Modeling Ouija Board as Collective Langevin Dynamics Sampling from Fused Language Models
arxiv.orgยท7h
๐ŸงญBehavioral Bioinformatics
Infrastructure as code translation for serverless using AI code assistants
aws.amazon.comยท15h
๐Ÿ“‹Tokei
Globalization for Scalable Short-term Load Forecasting
arxiv.orgยท7h
๐ŸœSwarm Intelligence
Loading...Loading more...
AboutBlogChangelogRoadmap