Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Error Boundaries
Fault Isolation, Exception Safety, Recovery Strategies, Resilience
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123369
posts in
3.99
s
Resilience vs. Sovereignty: Implementation Challenges of
RIR
Emergency Operations Under the
ICP-2
Framework
circleid.com
ยท
9h
๐
Capability Protocols
Introduction To
Concurrency
|
Concurrency
Interview |
AlgoMaster.io
algomaster.io
ยท
12h
๐
Concurrency Primitives
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
ยท
13h
๐ฌ
Nanopasses
Everything I know about good system design
seangoedecke.com
ยท
2d
๐๏ธ
Database Engines
Versioning
and Testing Data Solutions:
Applying
CI and Unit Tests on Interview-style Queries
kdnuggets.com
ยท
13h
๐ณ
Tree Shaking
Migrational
Thinking
productengineered.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Code Migration
Bringing a
jewel-encrusted
warhammer to a knife fight
reorchestrate.com
ยท
5h
ยท
Discuss:
Hacker News
,
r/rust
โจ
Gleam
Harness
engineering: leveraging
Codex
in an agent-first world
news.ycombinator.com
ยท
4h
ยท
Discuss:
Hacker News
๐ญ
Program Synthesis
Formal
Methods
Practice and Theory
adacore.com
ยท
1d
ยท
Discuss:
Hacker News
๐ฏ
Symbolic Execution
Measure
Twice
, Prompt Once
ignasibosch.com
ยท
1d
ยท
Discuss:
DEV
๐ฌ
Nanopasses
Optimizing the
MongoDB
Java Driver: How minor
optimizations
led to macro gains
linkedin.com
ยท
6h
ยท
Discuss:
DEV
โก
Interpreter Optimization
Building
DamN64
: LLM-Assisted
N64
Development
vieux.fr
ยท
7h
ยท
Discuss:
Hacker News
๐๏ธ
LLVM
The strategic
SIEM
buyer
โs guide: Choosing an AI-ready platform for the agentic era
microsoft.com
ยท
9h
๐ง
WASI
Agents Can
Either
Be
Useful
or Secure
auth0.com
ยท
1d
๐ก๏ธ
Capability Security
Compiler-Driven Static Analysis
Locking
Context Checking
Merged
For Linux 7.0
phoronix.com
ยท
15h
๐
Escape Analysis
Unveiling
Bagel
: Why Your Developer's Laptop is the
Softest
Target in Your Supply Chain
boostsecurity.io
ยท
8h
๐ฐ
Capability Machines
Open Source in Focus: .NET Projects and the Tools Behind Them
blog.jetbrains.com
ยท
1d
๐ฎ
Language Ergonomics
Power
Automate
powerdevbox.com
ยท
2d
ยท
Discuss:
DEV
๐ฌ
Interactive REPLs
Agentic
Tool
Patterns
โ 54
patterns
for building tools LLM agents can use
blog.arcade.dev
ยท
2d
ยท
Discuss:
Hacker News
โ
Configuration Validation
The Secret Life of Go:
Panic
and
Recover
dev.to
ยท
1d
ยท
Discuss:
DEV
๐
Error Propagation
Loading...
Loading more...
« Page 4
โข
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help