Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Memory Safety
Ownership, Borrowing, Lifetimes, RAII
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74127
posts in
535.6
ms
Implementing
vector
accu.org
·
2d
·
Discuss:
r/cpp
📌
Pin Projection
A $
10K
Mac Studio Won’t
Replace
Your API Bill
iain.so
·
2d
📱
Edge AI
MIND:
Benchmarking
Memory
Consistency
and Action Control in World Models
arxiv.org
·
15h
🧠
Memory Models
Series-Parallel-Loop
Decompositions
of Control-flow Graphs
arxiv.org
·
15h
🔗
GCC Link-Time Optimization
Memory
Mania
: How a Once-in-Four-Decades Shortage Is
Fueling
a Memory Boom
newsletter.semianalysis.com
·
4d
🌊
Memory Bandwidth
Learnings
from Creating a
GUI
Library
blog.s-schoener.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
🧊
Iced
Introduction to
Abject-Oriented
Programming (2007)
typicalprogrammer.com
·
2d
·
Discuss:
Hacker News
🦀
Rust Macros
Designing the Engine: How I Built a
Laravel-Like
PHP
Starter Kit
fiverr.com
·
1d
·
Discuss:
DEV
🔄
Salsa
Jan Kristof
Nidzwetzki
: eBPF Tracing of PostgreSQL
Spinlocks
jnidzwetzki.github.io
·
2d
🔄
Spin Locks
MicroBlaze
MCS Seven-Segment Counter on
Basys
3 FPGA
hackster.io
·
3d
🏗
Computer Architecture
Build a
Compiler
in Five Projects
kmicinski.com
·
3d
🔨
Compilers
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
3d
·
Discuss:
Hacker News
#️⃣
Perfect Hashing
Save 89% on a
Aivolut
Book Creator (Basic)
lifetime
subscription
neowin.net
·
1d
⚙️
XLA
How Meta turned the Linux Kernel into a planet-scale
Load
Balancer
. Part I
softwarefrontier.substack.com
·
3d
·
Discuss:
Substack
⚖️
Katran
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
2d
·
Discuss:
DEV
📬
MessagePack
The control
layer
for AI
blog.dottxt.ai
·
3d
·
Discuss:
Hacker News
🛡️
AI Security
Private Data Space Model
privatedata.space
·
5d
🔗
Intrusive Containers
Heterogeneous
Processing: A Strategy for
Augmenting
Moore's Law (2006)
linuxjournal.com
·
2d
·
Discuss:
Hacker News
⚡
Hardware Acceleration
From
CS230
Theory to Production Android: Building a Privacy-First Credit Risk
Classifier
pub.towardsai.net
·
1d
💰
TigerBeetle
Why Security Needs Its
SRE
Moment
syscall.wtf
·
2d
🔐
Capability Systems
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help