Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏗️ Hash Tables
Robin Hood Hashing, Cuckoo Hashing, Open Addressing, Load Factors
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81219
posts in
988.0
ms
Unique
identifiers
privacy.ca.gov
·
14h
🔗
Hash Functions
In-depth Analysis of
Banker
's
Rounding
Algorithm in C# Math.Round and Its Applications
devgex.com
·
4h
🔢
Algebraic Datatypes
Pretty Printing the ART (Adaptive
Radix
Tree) in
DuckDB
artjomplaunov.github.io
·
1d
🤐
Zipper Structures
a free-to-use data
modeler/generator
for any database
synthforge.io
·
8h
·
Discuss:
Hacker News
📋
Tablegen
Deep Dive into New
XWorm
Campaign Utilizing Multiple-Themed
Phishing
Emails
fortinet.com
·
6h
🛡️
Taint Analysis
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
·
1d
·
Discuss:
Hacker News
,
Hacker News
🎯
Ring Buffers
Rust Memory Management: The
Playroom
Analogy
adacore.com
·
6h
·
Discuss:
Hacker News
🔒
Rust Borrowing
FreeBSD
Errata
Notice FreeBSD-EN-26:
04.arm64
bsdsec.net
·
2h
📦
Executable Size
ZK-Rollup
for
Hyperledger
Fabric: Architecture and Performance Evaluation
arxiv.org
·
15h
📮
Message Queues
E2EE
Backend part 1:
Homomorphic
Encryption
peterspath.net
·
1d
·
Discuss:
Hacker News
🔗
Hash Functions
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
2d
🎯
Bit Vectors
XFS
– Block Atomic Writes in
UEK8
blogs.oracle.com
·
6h
🗑️
Concurrent GC
Podcast: [Video Podcast] Improving
Valkey
with
Madelyn
Olson
infoq.com
·
1d
📡
Protocol Buffers
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
2d
·
Discuss:
Hacker News
📜
Bytecode Interpreters
Building a Scalable
URL
Shortener
github.com
·
9h
·
Discuss:
DEV
⚡
Incremental Parsing
The
Immutable
Ledger
: Data Integrity Through TypeScript & Design Patterns
dev.to
·
17h
·
Discuss:
DEV
📡
Protocol Buffers
Eusing
Free Registry
Defrag
3.0
majorgeeks.com
·
14m
📋
Copy GC
CIC-Trap4Phish
: A Unified Multi-Format Dataset for Phishing and
Quishing
Attachment Detection
arxiv.org
·
15h
🛡️
Parser Security
The middle ground between
canonical
models and data
mesh
frederickvanbrabant.com
·
6h
·
Discuss:
r/programming
🏛️
Elm Architecture
A
pattern
for safe
database
access with AI coding agents
docs.getpochi.com
·
1h
·
Discuss:
Hacker News
🏰
Capability Machines
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help