Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 S2N-QUIC
AWS QUIC, Formal Verification, Performance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
110572
posts in
1.50
s
#0183:
RLWRAP
and Elixir: A Pragmatic Approach to CLI
Readline
Support
matthewsinclair.medium.com
·
1d
⌨️
CLI Development
The Machine Learning
Practitioner
’s Guide to
Speculative
Decoding
machinelearningmastery.com
·
1d
🌀
Naiad
CodeSOD
:
Cover
Up
thedailywtf.com
·
1d
📡
SonarQube
A Simple Guide to Building AI Agents
Correctly
digitalocean.com
·
17h
🎭
Program Synthesis
mradermacher/Qwen3-Coder-Next-REAM-GGUF
huggingface.co
·
14h
·
Discuss:
r/LocalLLaMA
🎯
Lance
[
AINews
] Z.ai GLM-5: New
SOTA
Open Weights LLM
latent.space
·
15h
⚙️
XLA
AFMTJ
Model For In-Memory Computing (University of
Arizona
)
semiengineering.com
·
2d
🧠
PIM
[
TUHS
] bare m4 (was BTL
summmer
employees)
tuhs.org
·
1d
·
Discuss:
Lobsters
📦
Serde
How to Build a Privacy-Preserving Federated Pipeline to Fine-Tune Large Language Models with
LoRA
Using Flower and
PEFT
marktechpost.com
·
2d
🦙
Ollama
ANIMAGUS
: A Provably Secure
Accordion
Mode of Operation
eprint.iacr.org
·
1d
🔒
Tetragon
I built a
zero-noise
AI code review agent using Claude Code
medium.com
·
1d
·
Discuss:
Hacker News
🎭
Program Synthesis
I
Asked
My AI to Find
Vulnerable
AI. It Found 2,442
infosecwriteups.com
·
18h
🛡️
AI Security
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
·
1d
💼
Thrift
[Paper] How does information access affect LLM
monitors
' ability to detect
sabotage
?
lesswrong.com
·
1d
🛡️
RAII
Shell
+ Skills +
Compaction
: Tips for long-running agents that do real work
developers.openai.com
·
21h
⏱️
Temporal Workflow
What AI Security Research Looks Like When It Works
aisle.com
·
2d
🛡️
AI Security
Craig
Interpolation
in Program Verification
arxiv.org
·
2d
✓
Formal Verification
Building
Chess
in about 350 lines of
Clojure
sammystraus.com
·
21h
·
Discuss:
Hacker News
🔵
Clojure
Cross Compiling
CGO
with
Dagger
and Zig
johncodes.com
·
11h
·
Discuss:
Hacker News
🏗️
Build Systems
From 97% Model Accuracy to 74% Clinical Reliability: Building
RSN-NNSL-GATE-001
dev.to
·
6h
·
Discuss:
DEV
🏗️
Cranelift
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help