Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
bombata053's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81877
posts in
1.02
s
Loading...
Subscribe
The
craft
of screen graphics and movie user
interfaces
(2014)
pushing-pixels.org
·
14h
·
Discuss:
Hacker News
🎨
Computer Graphics
Scott
Aaronson
: Is the Brain a Computer?
3quarksdaily.com
·
1h
🕸️
Graph Theory
iScheduler
: Reinforcement Learning-Driven
Continual
Optimization for Large-Scale Resource Investment Problems
arxiv.org
·
14h
🔄
Dynamic Programming
Quantifying
Energy-Efficient Edge Intelligence: Inference-time Scaling Laws for
Heterogeneous
Computing
arxiv.org
·
14h
⏱️
Computational Complexity
Casual
For Registers,
Rectangles
, And Windows
irreal.org
·
3h
💻
programming
Feb
28 2026
nycresistor.com
·
18h
💻
programming
Command
and Control
halfworkshq.itch.io
·
1d
🏗️
Design Patterns
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
The deep history of AI
began
3,000 years ago
bigthink.com
·
4h
⏱️
Computational Complexity
EU, Dutch government announce
hacks
following
Ivanti
zero-days
therecord.media
·
6h
💣
Binary Exploitation
AI meets you where you are:
Slack
, email &
ServiceNow
developers.redhat.com
·
12h
🏗️
Design Patterns
A
Horrible
Conclusion
addisoncrump.info
·
2d
·
Discuss:
Lobsters
,
Hacker News
💣
Binary Exploitation
Private Data Space Model
privatedata.space
·
4d
λ
Functional Programming
Stochastic
Differential
Equations
and Temperature — NASA Climate Data pt. 2
pub.towardsai.net
·
1d
🔢
Numerical Methods
Show HN: We added
AGENTS.md
to 120 challenges so AI
teaches
instead of codes
frontendmentor.io
·
4h
·
Discuss:
Hacker News
🎯
A* Search
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
1d
·
Discuss:
DEV
💣
Binary Exploitation
We Build Software for
Humans
— Not for
Machines
. And That’s a Problem.
medium.com
·
5h
·
Discuss:
r/programming
🔬
Static Analysis
Claude Code for
Designers
- Design
zeldman.com
·
6h
🌳
Red-Black Trees
AnasRm01/file-validator
: Lightweight security tool to detect file extension spoofing
github.com
·
18h
·
Discuss:
DEV
,
Hacker News
💣
Binary Exploitation
Create Your First Game in TypeScript:
ASCII
Space
Invaders
with Sound
dev.to
·
2h
·
Discuss:
DEV
💻
programming
Podcast: [Video Podcast] Improving
Valkey
with
Madelyn
Olson
infoq.com
·
8h
λ
Functional Programming
Loading...
Loading more...
« Page 19
•
Page 21 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help