Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Systems Programming
low-level programming, memory management, C, systems software
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200550
posts in
42.8
ms
mimalloc
: A new, high-performance, scalable memory
allocator
for the modern era
🧠
Memory Management
microsoft.com
·
1d
·
Hacker News
,
r/programming
Skills
For
Embedded
Systems Software Developers
🔨
Developer Craft
embeddedrelated.com
·
14h
The
LIFO
Stack
🐧
Operating Systems
i-programmer.info
·
3d
Finding a
Crab
in the C:
Assured
Translation via Comparative Symbolic Execution
⚡
Interpreter Optimization
arxiv.org
·
23h
System calls: how
programs
talk to the Linux
kernel
📞
System Calls
serversfor.dev
·
1d
Virtual Memory: A Deep Dive into Page Tables,
TLBs
, and Linux
Internals
🐧
Operating Systems
blog.codingconfessions.com
·
4d
Less is
exponentially
more (2012)
🧸
Toy Compilers
commandcenter.blogspot.com
·
17h
·
Hacker News
Type-driven design in
automotive
C: how much of my code is manual type
checking
?
🛡️
Defensive Coding
lmilz.dev
·
1d
·
Hacker News
Policy
groups
for memory management
🧠
Memory Management
lwn.net
·
8h
A
defer-safe
way to
allocate
nested arrays
🗑️
Garbage Collection
ziggit.dev
·
2d
Technical
Dimensions
of Programming Systems
🎨
Design Systems
tomasp.net
·
4d
·
Hacker News
The engineering management memory crisis
✍️
Prompt Engineering
newsletter.manager.dev
·
2d
Hardware
Memory Models (Memory Models, Part 1)
🖥️
Hardware Architecture
research.swtch.com
·
6d
·
Hacker News
Ignore previous
directions
12: System programming
experiments
with AI
💻
Codex
Ignore Previous Directions via buttondown.com
·
6d
The Linux
Kernel
Startup
🐧
Operating Systems
internals-for-interns.com
·
3d
·
Hacker News
,
Hacker News
CHERIoT-Ibex
: Closing the door on memory safety vulnerabilities with
hardware-enforced
protection
🛡️
Memory Safety
techcommunity.microsoft.com
·
5d
Deep inside the COM: Reading Windows
ROT
Without Asking
Permission
. Detective story
🏺
Format Archaeology
github.com
·
4d
·
DEV
Enhancing Instruction
Prefetching
via Cache and
TLB
Management
🖥️
Hardware Architecture
arxiv.org
·
1d
The Two
Abstractions
of System Design:
Hide
or Reduce
✨
Effect Handlers
muratbuffalo.blogspot.com
·
6d
·
Hacker News
,
Blogger
Pomegranate
: A Lightweight
Compartmentalization
Architecture using Virtualization Extensions
🏛️
Software Architecture
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help