๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Formal Methods
Type Theory, Program Verification, Theorem Proving, Specification Languages
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Show HN: DocGoblin โ A Super Fast Desktop Search Engine for Your PDFs
docgoblin.com
ยท
1d
ยท
Discuss:
Hacker News
๐น
Apache Arrow
H2, the Java SQL Database
h2database.com
ยท
1d
ยท
Discuss:
Hacker News
๐๏ธ
Database Internals
Developed the First Quantum Metabolic Avatar, Digital Twin of Human
newswise.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Timeseries
Safer Drivers, Stronger Devices
techcommunity.microsoft.com
ยท
2d
ยท
Discuss:
Hacker News
๐ป
Programming languages
Why outsourcing cybersecurity is rising in the Adriatic region
helpnetsecurity.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Stream Processing
Generative AI models love to cite Reuters and Axios, study finds
niemanlab.org
ยท
2d
ยท
Discuss:
Hacker News
๐ฎ
Message Queues
I Just Wanted a RAID Array
russ.har.mn
ยท
2d
ยท
Discuss:
Hacker News
,
r/selfhosted
๐น
Apache Arrow
From Envoy to Consul chasing a latency spike across a globally distributed stack
koyeb.com
ยท
2d
ยท
Discuss:
Hacker News
๐งฉ
Microservices
Downloading arbitrary Apple Podcast episode transcripts
blog.alexbeals.com
ยท
3d
ยท
Discuss:
Hacker News
๐ฎ
Message Queues
Fast(er)API: Optimizing Processing Time
fabridamicelli.github.io
ยท
5d
ยท
Discuss:
Hacker News
๐ป
Programming languages
Lying Increases Trust in Science
link.springer.com
ยท
21h
ยท
Discuss:
Hacker News
๐
Security Patterns
AI could soon think in ways we don't even understand โ evading our efforts to keep it aligned โ top AI scientists warn
livescience.com
ยท
3d
ยท
Discuss:
Hacker News
๐
Distributed systems
Unique, mathematical shortcuts language models use to predict dynamic scenarios
eecs.mit.edu
ยท
5d
ยท
Discuss:
Hacker News
๐ป
Programming languages
The First Large Visual Memory Model
memories.ai
ยท
2d
ยท
Discuss:
Hacker News
๐
Query Engines
The Many Faces of Agentic Identities
cyata.ai
ยท
3d
ยท
Discuss:
Hacker News
๐
Security Patterns
Dollo's Law of Irreversibility
en.wikipedia.org
ยท
13h
ยท
Discuss:
Hacker News
๐
Timeseries
The magic wand that solves agent memory
news.ycombinator.com
ยท
2d
ยท
Discuss:
Hacker News
๐ง
Memory Management
Show HN: CandleVision Real-time candlestick detection with YOLOv8
github.com
ยท
1d
ยท
Discuss:
Hacker News
๐ป
Programming languages
Erase Your Darlings
grahamc.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Distributed systems
From REST to Reasoning: A Journey Through AI-First Architecture
oreilly.com
ยท
5d
ยท
Discuss:
Hacker News
๐
Distributed systems
Loading...
Loading more...
« Page 26
โข
Page 28 »