๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Postgres
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
blog.cloudflare.com
ยท
3d
ยท
Discuss:
Hacker News
๐ง
Linux
Political Fundraising Email Database
thescoop.org
ยท
8h
ยท
Discuss:
Hacker News
๐๏ธ
Databases
Beast X for Bayesian phylogenetic, phylogeographic and phylodynamic inference
nature.com
ยท
7h
ยท
Discuss:
Hacker News
๐
Reverse Engineering
Async I/O on Linux and durability
blog.canoozie.net
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
โ๏ธ
System Programming
Billions of Edges per Second with Postgres
onesparse.com
ยท
5d
ยท
Discuss:
Hacker News
๐ป
Programming
How Go 1.24 Swiss Tables saved us hundreds of gigabytes
datadoghq.com
ยท
3d
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
๐น
Golang
iMessage integration in Claude can hijack the model to do anything
generalanalysis.com
ยท
4h
ยท
Discuss:
Hacker News
๐
Security
Perl Versioning Scheme and Gentoo
wiki.gentoo.org
ยท
1d
ยท
Discuss:
Hacker News
๐ง
Linux
Tao: The Power of the Graph (2013)
engineering.fb.com
ยท
2d
ยท
Discuss:
Hacker News
๐๏ธ
Databases
Why pull-based pipelines are faster
blog.sequinstream.com
ยท
3d
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
โ๏ธ
System Programming
Categorizing Book Notes with AI
mieubrisse.substack.com
ยท
13h
ยท
Discuss:
Substack
๐ป
Programming
Show HN: An Intuitive Go Library for Handling Complex Permission/RBAC
github.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Security
Deeper Theories of Program Design
typesanitizer.com
ยท
9h
ยท
Discuss:
Hacker News
๐๏ธ
Software Design
Portable Forensics with Toby: A Raspberry Pi Toolkit
bakerstreetforensics.com
ยท
7h
ยท
Discuss:
Hacker News
๐ง
Linux
Chess Llama - Training a tiny Llama model to play chess
lazy-guy.github.io
ยท
13h
ยท
Discuss:
Hacker News
,
r/LocalLLaMA
,
r/programming
๐น
Golang
A curated directory for developers to discover and showcase tech products
devhub.best
ยท
2h
ยท
Discuss:
Hacker News
๐๏ธ
Software Design
ToolShell Mass Exploitation (CVE-2025-53770)
research.eye.security
ยท
8h
ยท
Discuss:
Hacker News
๐
Security
Show HN: Duende: Web UX for guiding Gemini as it improves your source code
github.com
ยท
8h
ยท
Discuss:
Hacker News
๐ป
Programming
Door Wide AI: The 64M Users McDonald's Left Behind
vitraag.com
ยท
1h
ยท
Discuss:
Hacker News
๐
Security
Hiding messages in a deck playing cards
asherfalcon.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Security
Loading...
Loading more...
« Page 1
โข
Page 3 »