🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧠 Memory Allocators

Heap Management, Garbage Collection, Memory Safety, Performance

The Purpose of Design Patterns
storytotell.org·2d
🐚Shell Calculus
Is Zen 5 Finally Better for Gaming? Ryzen 9600X vs. 7600X
techspot.com·1d
⚡Performance Tools
Inside the Man vs. Machine Hackathon
wired.com·1d
🚀Indie Hacking
Show HN: Asimov's three laws, a working implementation (don't use in production)
maybedont.ai·1d·
Discuss: Hacker News
⚖️Emulation Ethics
Disrupting the DRAM roadmap with capacitor-less IGZO-DRAM technology
imec-int.com·1d·
Discuss: Hacker News
💾Persistent Memory
dedicatedcode/reitti: Reitti is a comprehensive personal location tracking and analysis application that helps you understand your movement patterns and signifi...
github.com·2d
📦Container Security
Fibonacci Funhouse: Exploring Ruby Algorithms for Fibonacci Numbers
rorvswild.com·8h·
Discuss: Hacker News
📐Interval Arithmetic
What's new in Kotlin 2.2.20
kotlinlang.org·6h·
Discuss: Lobsters, Hacker News
🔬Refinement Types
SQLite can handle most of it
binaryigor.com·5d·
Discuss: Hacker News
🗄️SQLite Internals
Show HN: SwiftLake – Lightweight SQL Engine for Iceberg Tables
github.com·1d·
Discuss: Hacker News
🌊Streaming Systems
DevOps Automation with Python: Intelligent System Monitoring with Auto Recovery
dev.to·3h·
Discuss: DEV
👁️System Observability
Investigating IntelliJ Platform UI Freezes
blog.jetbrains.com·1d·
Discuss: Hacker News
🌊Stream Processing
Adaptive Resonance Control of MEMS Mirrors for LiDAR Scanning via Dynamic Frequency Modulation
dev.to·1h·
Discuss: DEV
⚙️Cassette Mechanics
Notes from PyData Berlin 2025
dev.to·12h·
Discuss: DEV
🌀Brotli Internals
Ban&Pick: Achieving Free Performance Gains and Inference Speedup via Smarter Routing in MoE-LLMs
arxiv.org·1d
💻Local LLMs
MCP & API: Are they Two Sides of the Same Coin, or Worlds Apart?
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
When Dependencies Turn Dangerous: Responding to the NPM Supply Chain Attack
blog.qualys.com·1h
🔗Supply Chain
Attention and Risk-Aware Decision Framework for Safe Autonomous Driving
arxiv.org·18h
🌀Riemannian Computing
Algorithmic Optimization of Mycelium-Based Seafood Texture via Bio-Reactive Feedback Loops
dev.to·10h·
Discuss: DEV
🧮Algorithmic Cooking
Scaffolding for production vibe coding
interjectedfuture.com·1d·
Discuss: Hacker News
📏Code Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap