Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎲 Cryptographic Nonces
Mining Process, Random Numbers, Hash Computation, Proof of Work
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122126
posts in
915.8
ms
Optimizing
cavitation
performance of a
centrifugal
pump: A hybrid approach of combining Random Forest and feature selection
sciencedirect.com
·
1d
🪙
bitcoin
The
Datacenter
as a Computer: An Introduction to the Design of
Warehouse-Scale
Machines, Second Edition
research.google
·
2d
·
Discuss:
Hacker News
🪙
Bitcoin
Not All
RecSys
Problems Are Created
Equal
towardsdatascience.com
·
1d
🪙
bitcoin
Show HN: I built simple browser tools
bcoz
I'm
tired
of everything becoming SaaS
bitlist.io
·
1d
·
Discuss:
Hacker News
🪙
bitcoin
The Hidden Risks in Modern
Applications
and How to
Protect
Against Them
theaisurf.com
·
2d
🪙
bitcoin
A
pattern
for safe
database
access with AI coding agents
docs.getpochi.com
·
2d
·
Discuss:
Hacker News
,
r/programming
🪙
bitcoin
Blockchain
Is a
Galactic
Algorithm
shakeddown.substack.com
·
2d
·
Discuss:
Substack
🪙
Bitcoin
The game is over: when “free” comes at too high a price. What we know about
RenEngine
securelist.com
·
1d
🪙
Bitcoin
January 2026 Monthly report | Alternative Rust
Compiler
for
GCC
rust-gcc.github.io
·
2d
·
Discuss:
r/rust
🪙
bitcoin
AI giants are
racing
to secure
shrinking
memory. It’s creating opportunities for startups
sifted.eu
·
3d
🪙
bitcoin
Building a Reliable AI Analytics Agent with
BigQuery
, a Semantic Layer, and Google
ADK
pub.towardsai.net
·
1d
🪙
bitcoin
CloudFront
Adds Origin
mTLS
Authentication for End-to-End Zero Trust
infoq.com
·
1d
🪙
bitcoin
Opus 4.6 Reasoning
Distill
3k
prompts
huggingface.co
·
2d
·
Discuss:
r/LocalLLaMA
🪙
bitcoin
AI
Scam
Strategies
trendhunter.com
·
3d
🪙
Bitcoin
Notepad-Plus
Fuss
:
Notepad
++ Supply Chain Attack Analysis
levelblue.com
·
2d
🪙
Bitcoin
A Technical Guide to
Stealth
Addresses
and On-Chain Privacy
hackernoon.com
·
3d
🪙
Bitcoin
borodark/exmc
: Probabilistic programming in BEAM
github.com
·
1d
🪙
Bitcoin
Insert
Operation: How a B+-Tree
Grows
Without Losing Order
dev.to
·
2d
·
Discuss:
DEV
🪙
bitcoin
Cavefish
: Communication-Optimal Light Client Protocol for
UTxO
Ledgers
eprint.iacr.org
·
2d
🪙
Bitcoin
Network function
computation
with
vector
linear target function and security function
arxiv.org
·
2d
🪙
bitcoin
Loading...
Loading more...
« Page 14
•
Page 16 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help