Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📦 Dataclasses
Python, Data Structures, Type Hints, @dataclass
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3589
posts in
136.8
ms
Does Programming Language Matter? An
Empirical
Study of
Fuzzing
Bug Detection
arxiv.org
·
3d
✅
Pydantic
The High Cost of Data
Augmentation
for Learning
Equivariant
Models
arxiv.org
·
5d
✅
Pydantic
Have We Been Thinking About
Exercise
Wrong for Half a
Century
?
science.slashdot.org
·
1d
🎮
gaming
Converting AC
Irrigation
Valves
To DC Operation
hackaday.com
·
3h
🔧
Mechanical Switches
Iran’s Digital
Surveillance
Machine Is
Almost
Complete
wired.com
·
11h
🔬
Synthetic Data
Travel to
Cheap
Destinations
nomagicpill.substack.com
·
1d
·
Discuss:
Substack
🌍
Geography
This Startup Thinks It Can Make
Rocket
Fuel From Water. Stop
Laughing
wired.com
·
12h
☕
brewing
A very good
deconstruction
of the #NATO expansion
fable
, with lots of details and actual document...
agora.echelon.pl
·
1d
🌍
Geography
Tracking
Global
Narratives
chinamediaproject.org
·
16h
🌍
Geography
The Journey to a
Safer
Frontend
: Why We Removed React.FC
engineering.gusto.com
·
5h
📦
uv
Why JavaScript Needs
Structured
Concurrency
| Blog
frontside.com
·
6h
·
Discuss:
r/javascript
⚡
Python Concurrency
SectorC
: a C compiler in 512
bytes
blog.adafruit.com
·
28m
⚡
Ruff
the
mathematics
of
compression
in database systems
bitsxpages.com
·
3h
📊
Parquet
A
practical
guide to information
architecture
(2nd edition)
maadmob.com.au
·
1d
🏗️
Design Patterns
Before Dashboards, We Had
Blinky
Lights @
DotNetMartin
youtube.com
·
1d
🎮
Wooting
Microsoft On
QEMU
10.2's New
MSHV
Accelerator For Hyper-V Guests
phoronix.com
·
1d
⌨️
ZMK
A Language For Agents
lucumr.pocoo.org
·
22h
·
Discuss:
Lobsters
,
Hacker News
🎀
Decorators
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
1d
·
Discuss:
Hacker News
📊
Apache Kafka
Ask
Hackaday
: How Do You
Detect
Hidden Cameras?
hackaday.com
·
7h
🎱
Trackballs
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
15h
·
Discuss:
Substack
🔄
Data Pipelines
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help