Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
λ Functional Programming
Lambda Functions, Immutability, Higher-Order Functions, Recursion
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
571
posts in
8.4
ms
The
Boxes
Were Already Open
🔤
Type Systems
srodingr.substack.com
·
1d
I
persisted
! The macOS version of “she
danced
in the wind like a holographic dream before the world died” is here x)
💻
Terminal Emulators
nathalielawhead.com
·
22h
AI coding as
VB
coding
🤖
AI Code Generation
storagezilla.xyz
·
3d
Project
Glasswing
and open source software: The good, the bad, and the
ugly
🌐
Open Source
theregister.com
·
2h
·
Hacker News
Security through
chaos
🔓
Binary Exploitation
phpunit.expert
·
2d
Thursday
assorted
links
🌌
Cosmology
marginalrevolution.com
·
22h
CDS
expressions
in CAP
🔤
Type Systems
qmacro.org
·
3d
I Built a Design Team Out of AI Agents
💬
Prompt Engineering
rogerwong.me
·
22h
GLM-5.1
: Towards
Long-Horizon
Tasks
🤖
AI Code Generation
simonwillison.net
·
2d
·
Hacker News
GoZTASP
: A Zero-Trust Platform for
Governing
Autonomous Systems at Mission Scale
🏗️
System Design
content.knowledgehub.wiley.com
·
23h
[
Kenneth
] Re:
anaglyph
of cave-- animation [49 minutes ago]
💬
Prompt Engineering
news.povray.org
·
1d
Vibe
Coding
💻
Programming
idiotking.org
·
3d
Talk to the AI in my hand: A conversation with
Perplexity
Pro while out
runnng
3 (three) miles
💬
Prompt Engineering
bookofjoe2.blogspot.com
·
22h
Pag-Sure
Dira
Oi
💻
Programming
stupied.net
·
2d
Anatomy Of A Back Pocket Encounter: The
Screaming
Ambush
⚙️
Systems Programming
roleplayingtips.com
·
22h
Burrows
Wheeler
Transform for Compression
🔍
Reverse Engineering
denvaar.dev
·
6d
How a Student’s AI Robot
Lightens
the Load for
Caregivers
At Home
🔌
MicroPython
spectrum.ieee.org
·
2d
MindDump
🔍
Reverse Engineering
kuber.studio
·
22h
04.08.2026
💻
Programming
silicaspace.neocities.org
·
1d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔓
Binary Exploitation
securesql.info
·
23h
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help