Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
79928
posts in
525.9
ms
Biquandle
Fares and Link
Invariants
arxiv.org
·
1d
📇
Symbol Tables
Hermitian
Self-dual Generalized
Reed-Solomon
Codes
arxiv.org
·
1d
🔢
Binary Formats
Detecting
Phishing
Patterns with Go: Leveraging Open Source Tools for Robust Security
dev.to
·
6d
·
Discuss:
DEV
🌳
Pattern Match Compilation
From Messy
Wearables
to Insights: Building a Personal Health Data Warehouse with
DuckDB
& Evidence
dev.to
·
2d
·
Discuss:
DEV
🎮
Language Ergonomics
Robust
Majorana
Qubit Encoding in Disordered Two‑Dimensional Topological
Superconductors
Using Adaptive Surface Codes — ### Abstract This study present...
freederia.com
·
5d
🏰
Capability Machines
*Author(s): [Redacted]* *
Affiliation
(s): [Redacted]* *Date: [Redacted]* — ### Abstract We introduce a fully
commercializable
framework that leverages h...
freederia.com
·
3d
🏛️
Elm Architecture
What’s the
entropy
of a random
integer
?
quomodocumque.wordpress.com
·
6d
·
Discuss:
Hacker News
🔗
Hash Functions
Millets
: A practical memory-safety and thread-safety
experiment
eagledot.xyz
·
6d
·
Discuss:
Lobsters
,
Hacker News
🧠
Memory Models
CUDA
Guide:
Workflow
for Performance Tuning
digitalocean.com
·
5d
🧠
Memory Hierarchy
nilpunch/massive-ecs
:
Bitset-based
ECS with rollbacks. C# library and Unity package.
github.com
·
6d
🚂
Cranelift IR
Tipping
the Cyber Balance: How AI Benchmarks Could Make Software
Safer
rand.org
·
6d
🏰
Capability Machines
AIStor
Tables: Native Iceberg V3 for
On-Premises
Object Storage
blog.min.io
·
6d
🔄
Deduplication
A Quick Look at
QUIC
potaroo.net
·
6d
·
Discuss:
Hacker News
📡
Protocol Stacks
Recommended
Security
Measures
to Protect Your Servers
digitalocean.com
·
6d
🛡️
Capability VMs
akshat666/ephemeral-first-security-framework
: Security through
transience
, not just encryption
github.com
·
6d
·
Discuss:
Hacker News
🛡️
Security Type Systems
OpenSSH
connections with post-quantum key exchange through
WireGuard
tunnel
group.miletic.net
·
6d
·
Discuss:
Hacker News
🔗
Hash Functions
Logic for
Programmers
[
Leanpub
PDF/iPad/Kindle]
leanpub.com
·
6d
🧩
Constraint Logic
Zero trust in practice: A deep technical dive into going fully
passwordless
in hybrid enterprise
environments
csoonline.com
·
6d
🛡️
Capability Security
When cost models hit the wall
clock
futhark-lang.org
·
6d
🔄
Tail Call Analysis
Super speed, super quality: lessons from the
Aptos
Network site launch—Martian Chronicles, Evil
Martians
’ team blog
evilmartians.com
·
6d
💬
Smalltalk VMs
Loading...
Loading more...
« Page 14
•
Page 16 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help