Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
kxkrx's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81067
posts in
926.9
ms
Loading...
Subscribe
Reviving
a Living
Relic
sofisht.ink
·
5h
🔄
Legacy Migration
Software Design by
Example
: A File
Viewer
third-bit.com
·
1d
©️
C Programming
Show HN:
Molinar
– Open-source alternative to ai.com (
AGPL-3.0
)
business.molinar.ai
·
1h
·
Discuss:
Hacker News
📋
JCL
Linux Kernel 6.19 Arrives! You Get Intel, AMD
Improvements
, and ASUS
Armoury
Support
itsfoss.com
·
3h
⚡
Systems Programming
India’s
ambition
for AI for data centers and the hidden
constraints
of scale
americanbazaaronline.com
·
18h
🔄
Legacy Migration
AI didn’t kill
customer
support. It’s
rebuilding
it
fastcompany.com
·
1d
🔄
Legacy Migration
isledb
: An
embedded
key-value engine built on object storage in Go
reddit.com
·
21h
·
Discuss:
r/golang
⚡
Systems Programming
Mind
The
GAAP
Again
blog.dshr.org
·
3d
·
Discuss:
Hacker News
,
Blogger
🔄
Legacy Migration
Agentic
AI in
Full-Stack
Development: How We Went from Months to Days
dev.to
·
2h
·
Discuss:
DEV
📋
JCL
I Built a Python CLI Tool for RAG Over Any
Document
Folder
dev.to
·
1h
·
Discuss:
DEV
📋
JCL
What the
OpenClaw
moment means for
enterprises
: 5 big takeaways
venturebeat.com
·
2d
🔄
Legacy Migration
Codes for
Metastability-Containing
Addition
arxiv.org
·
3h
©️
C Programming
SPY
NEWS: 2026 — Week 6
medium.com
·
22h
🔒
CyberSecurity
C++
Implementing
a Chaos Game
simulator
solarianprogrammer.com
·
1d
©️
C Programming
Performance
Tip
of the Week #79: Make at most one
tradeoff
at a time
abseil.io
·
1d
⚡
Systems Programming
Hacker
claims theft of data from 700,000
Substack
users; Company confirms breach
securityaffairs.com
·
3d
🔒
CyberSecurity
CySecurity
News - Latest Information Security and Hacking
Incidents
: Romania’s National Oil Pipeline Joins a Growing Cyberattack list
cysecurity.news
·
16h
·
Discuss:
Blogger
🔒
CyberSecurity
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Tip of the Week #77:
Temporaries
, Moves, and
Copies
abseil.io
·
1d
©️
C Programming
thevgergroup/undetected-browser-tool
: Bypass browser bot detection in langchain tools
github.com
·
29m
📋
JCL
How We Built a 99% Accurate
Invoice
Processing System Using
OCR
and LLMs
pub.towardsai.net
·
1d
📋
JCL
Loading...
Loading more...
« Page 16
•
Page 18 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help