🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
Genbox's Top Finds
Loading...
Subscribe
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Keep the Terminal Relevant: Patterns for AI Agent Driven CLIs – InfoQ
infoq.com
·
1d
·
Discuss:
Hacker News
🟪
Programming
Simple Programming Languages
ryanbrewer.dev
·
3d
·
Discuss:
Hacker News
🟪
Programming
Cryptoasset Realization: How Cryptocurrencies Are Frozen, Seized, and Forfeited
chainalysis.com
·
1d
·
Discuss:
Hacker News
🛡️
Security
Mellanox, Nvidia, and the GPU Era
procurefyi.substack.com
·
3h
·
Discuss:
Substack
Fighting with YouTube to show a preview image
shaneosullivan.wordpress.com
·
2h
·
Discuss:
Hacker News
Cracking the Vault: How we found zero-day flaws in HashiCorp Vault
cyata.ai
·
4d
·
Discuss:
Hacker News
,
r/programming
🛡️
Security
BUILD: Solving the Software Complexity Puzzle
computing.llnl.gov
·
1d
·
Discuss:
Hacker News
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Why Is Stream Processing Hard?
blog.epsiolabs.com
·
1d
·
Discuss:
Hacker News
,
Hacker News
Rendering 120k+ Entities
mobcitygame.com
·
17h
·
Discuss:
Hacker News
Scaling Interpretability
anthropic.com
·
10h
·
Discuss:
Hacker News
Linear sent me down a local-first rabbit hole
bytemash.net
·
3d
·
Discuss:
Hacker News
🟪
Programming
K0rdent v1.0: Manage Distributed Infrastructure at Scale with Kubernetes
cncf.io
·
8h
·
Discuss:
Hacker News
A Full-Chain Exploit of an Unfused Qualcomm Device
hhj4ck.github.io
·
3d
·
Discuss:
Lobsters
,
Hacker News
🛡️
Security
Show HN: Crudloop – On-Demand Voice AI, Meeting Bots and Full-Stack Development
crudloop.com
·
1d
·
Discuss:
Hacker News
🟪
Programming
Myths About Floating-Point Numbers (2021)
asawicki.info
·
1d
·
Discuss:
Lobsters
,
Hacker News
🟪
Programming
Vector types and debug performance
blog.s-schoener.com
·
2d
·
Discuss:
Hacker News
,
r/cpp
🟪
Programming
Red Teams Jailbreak GPT-5 with Ease, Warn It's 'Nearly Unusable' for Enterprise
securityweek.com
·
2d
·
Discuss:
Hacker News
🛡️
Security
Built With Borrowed Hands
cra.mr
·
3d
·
Discuss:
Hacker News
🟪
Programming
Why Fighting Disinformation Needs Resilient Infrastructure
sphericalcowconsulting.com
·
2d
·
Discuss:
Hacker News
🛡️
Security
Exploring Traces: Agent trajectory walkthroughs from interesting examples
theori.io
·
2d
·
Discuss:
Hacker News
🛡️
Security
Loading...
Loading more...
« Page 4
•
Page 6 »