Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Digital Preservation
OAIS Model, Migration Strategies, Emulation, Bit Rot
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23098
posts in
280.9
ms
Ethereum Signature Schemes Explained: ECDSA, BLS,
XMSS
, and Post-Quantum
leanSig
with Rust Code Examples
blog.lambdaclass.com
·
2d
🔗
Hash Chains
Structured
Context Engineering for File-Native
Agentic
Systems
simonwillison.net
·
2d
📋
Document Grammar
Who
owns
our digital
afterlife
? Helping the law keep pace with society
phys.org
·
2d
🔗
Data Provenance
Towards a Standard for
JSON
Document
Databases
muratbuffalo.blogspot.com
·
2d
·
Discuss:
Blogger
📊
Graph Databases
Building a Fake News Kill Chain with
VeraSnap
and
CPP
— Full Implementation from Capture to Verification
dev.to
·
5d
·
Discuss:
DEV
🌳
Archive Merkle Trees
Relational Programming in
miniKanren
: Techniques, Applications, and
Implementations
(2009)
scholarworks.iu.edu
·
3d
·
Discuss:
Lobsters
📝
Concrete Syntax
I Started Programming When I Was 7. I'm 50 Now, and the Thing I
Loved
Has
Changed
jamesdrandall.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
🍎
Apple Computing
Benchmarking
Knowledge-Extraction
Attack and Defense on Retrieval-Augmented Generation
arxiv.org
·
1d
🔍
Information Retrieval
learning by
reverse
engineering
clymup.com
·
5d
🔓
Reverse engineering
Permissive-Washing
in the Open AI Supply Chain: A Large-Scale Audit of License Integrity
arxiv.org
·
2d
🔗
Supply Chain
isledb
: An
embedded
key-value engine built on object storage in Go
reddit.com
·
4d
·
Discuss:
r/golang
🏺
Database Archaeology
An introduction to
lockless
algorithms [
LWN.net
]
lwn.net
·
3d
⚡
Hardware Transactional Memory
Performance Tip of the Week #62:
Identifying
and reducing memory
bandwidth
needs
abseil.io
·
4d
💨
Cache Analysis
Building
Reliable
AI Applications: A
Validation
Strategy
dev.to
·
4d
·
Discuss:
DEV
✅
Format Verification
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
3d
·
Discuss:
Hacker News
📡
Network Protocol Design
LocalGPT
: A local AI assistant with
persistent
memory in a single binary
localgpt.app
·
2d
·
Discuss:
Hacker News
💻
Local LLMs
Unlocking core memories with
GoldSrc
engine and
CS
1.6 (2025)
danielbrendel.com
·
4d
·
Discuss:
Hacker News
⚡
Homebrew CPUs
Soft
Delete
Is a
Workaround
docs.eventsourcingdb.io
·
3d
·
Discuss:
Hacker News
⛏️
SQL Archaeology
Show HN:
ContinualCode
– a coding agent that updates its
weights
from feedback
sdan.github.io
·
2d
·
Discuss:
Hacker News
✨
Effect Handlers
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
3d
·
Discuss:
Substack
✅
Checksum Validation
Loading...
Loading more...
« Page 5
•
Page 7 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help