Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
λ Functional Programming
Lambda Functions, Immutability, Higher-Order Functions, Recursion
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81835
posts in
251.7
ms
Hello World:
Algorithmic
Trading &
DeFi
Logic
dev.to
·
1d
·
Discuss:
DEV
🔬
Static Analysis
Vibe coding an
RSS
feed
blog.fortrabbit.com
·
6h
·
Discuss:
Hacker News
🏗️
Design Patterns
🎲 TypeScript
strictness
is
non-monotonic
: strict-null-checks and no-implicit-any interact
huonw.github.io
·
3d
💻
programming
HyPER: Bridging Exploration and
Exploitation
for Scalable LLM Reasoning with
Hypothesis
Path Expansion and Reduction
arxiv.org
·
16h
⏱️
Computational Complexity
AI for
PHP
Developers. Practical Use of
TransformersPHP
dev.to
·
28m
·
Discuss:
DEV
🏗️
Design Patterns
Mapping
Gemma3
onto an Edge
Dataflow
Architecture
arxiv.org
·
16h
🎨
Computer Graphics
Python’s
Truthiness
: A Code Smell Worth
Sniffing
owl.billpg.com
·
3d
·
Discuss:
Hacker News
💣
Binary Exploitation
Flow-Based Programming:
Seminal
Texts and
Theoretical
Foundations
repolex.ai
·
3d
·
Discuss:
Hacker News
🏗️
Design Patterns
Stack
Overflow
for AI Coding Agents
shareful.ai
·
11h
·
Discuss:
Hacker News
,
Hacker News
⚙
algorithms
From
CS230
Theory to Production Android: Building a Privacy-First Credit Risk
Classifier
pub.towardsai.net
·
15h
📈
Optimization
I
Wrote
a
Scheme
in 2025
maplant.com
·
21h
·
Discuss:
Hacker News
💻
programming
An Introduction to
XML
Data
Binding
in C++
artima.com
·
1d
💻
programming
Building LLMs in
Resource-Constrained
Environments
: A Hands-On Perspective
infoq.com
·
10h
📈
Optimization
AI Code Generation Tools Repeat Security Flaws, Creating
Predictable
Software
Weaknesses
quantumzeitgeist.com
·
9h
💣
Binary Exploitation
Building
fault-tolerant
applications with AWS Lambda
durable
functions
aws.amazon.com
·
3d
🏗️
Design Patterns
Podcast: [Video Podcast] Improving
Valkey
with
Madelyn
Olson
infoq.com
·
10h
💣
Binary Exploitation
Bob
– Open-source AI personal agent with 170 tools, built in 3 days
github.com
·
12h
·
Discuss:
Hacker News
💻
programming
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
15h
💣
Binary Exploitation
My Most Important C++
Aha
!
Moments
...Ever
artima.com
·
1d
🌳
Red-Black Trees
**Abstract:** This paper proposes a novel framework for quantifying the inherent logical
incompleteness
present in
Gödelian
systems by dynamically mapping ax...
freederia.com
·
3d
⏱️
Computational Complexity
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help