Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🐛 Debugging Techniques
GDB, LLDB, Profiling, Memory Analysis, Performance Tuning
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
570
posts in
8.5
ms
Speeding Up
IAMTrail
: One Boto3 Process Instead of 1,500 CLI
Invocations
📦
UV Package Manager
zoph.me
·
6d
Part I — The original
quantitative
case: internet infrastructure is not
OK
🛡️
Security Research
securesql.info
·
1d
Spark creator
bags
computing
gong
for making big data a little bit smaller
⚙️
Systems Programming
theregister.com
·
23h
Security through
chaos
🔓
Binary Exploitation
phpunit.expert
·
2d
Exposing
an Agentic
Pipeline
as an MCP Server
🔌
LSP Protocol
walsenburgtech.com
·
4d
Shipyard
is a cross-platform CI orchestration layer that coordinates validation for AI agents working across parallel
worktrees
⚙️
Systems Programming
danielraffel.me
·
1d
Framework warns of further increases in RAM and SSD costs: The memory crisis is now
affecting
repairable
PCs as well
⚙️
Systems Programming
igorslab.de
·
1d
Is AI’s High
Bandwidth
Memory
Crunch
About to Hit Your Wallet?
⚙️
Systems Programming
spectrum.ieee.org
·
4d
Fewer
Computers
, Fewer Problems: Going Local With Builds &
Deployments
⚙️
Dotfiles
blog.jim-nielsen.com
·
1d
The Building Block Economy
🌐
Open Source
mitchellh.com
·
3d
·
Lobsters
,
Hacker News
Fedora
44: Best New Features
💻
Terminal Emulators
debugpoint.com
·
1d
Anthropic’s Project
Glasswing
—restricting Claude
Mythos
to security researchers—sounds necessary to me
🛡️
Security Research
simonwillison.net
·
2d
·
Hacker News
PKLITE
supplement 6: Min/max
alloc
., part 1
🔓
Binary Exploitation
entropymine.wordpress.com
·
5d
Conceptual Machines releases
MAGDA
, a FREE AI-assisted
DAW
💬
Prompt Engineering
bedroomproducersblog.com
·
1d
Why your files are
slowly
dying
🔓
Binary Exploitation
behindtheviewfinder.com
·
4d
MindDump
🔍
Reverse Engineering
kuber.studio
·
1d
Part III — When the security scanner became the weapon:
Trivy
→
LiteLLM
→ Axios
🔓
Binary Exploitation
securesql.info
·
23h
The
bottleneck
shifts
to distribution
🌐
Open Source
newsletter.squishy.computer
·
2d
Container smoke testing with
Goss
: stop guessing if your
.env
works
✅
Pytest
blog.zolty.systems
·
4d
Context
Windows for People
💬
Prompt Engineering
jonathannen.com
·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help