๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
โ Data Validation
Schema Checking, Data Quality, Integrity Constraints, Error Detection
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
The Grep Command in Linux
thenewstack.io
ยท
11h
๐ฆ
Malware Analysis
What Will It Take to Restore a Serious Flight Simulator?
hackaday.com
ยท
17h
๐ฆ
Malware Analysis
Show HN: Dyan โ A Self-Hosted Visual REST API Builder (React and NestJS)
github.com
ยท
16h
ยท
Discuss:
Hacker News
๐
Tokei
It is 1939 and you want to use public-key cryptography
shkspr.mobi
ยท
14h
ยท
Discuss:
Hacker News
,
shkspr.mobi
๐
Privacy Engineering
Things Not to Learn as an AI Engineer โ By Paul Iusztin
decodingml.substack.com
ยท
10h
ยท
Discuss:
Substack
๐
AI Detection
System Design Isnโt About Requirements โ Itโs About Change
dev.to
ยท
18h
ยท
Discuss:
DEV
๐ง
Iceberg Tables
What birdsong and backends can teach us about magic
digitalseams.com
ยท
10h
ยท
Discuss:
Hacker News
๐ง
Iceberg Tables
[P] Convert generative pixel-art images or low-quality web uploads of sprites to true usable pixel-resolution assets
reddit.com
ยท
7h
ยท
Discuss:
r/MachineLearning
๐
Tokei
I Tested Grok 4 to See if the Hype is Real: What I Found Will Surprise You
dev.to
ยท
5h
ยท
Discuss:
DEV
๐
data engineering
The Importance of Coding in the Human World
code.com
ยท
9h
ยท
Discuss:
DEV
๐
data visualisation
Modern Hosting Options: A Comprehensive Technical Comparison Across 7 Dimensions
dev.to
ยท
13h
ยท
Discuss:
DEV
๐
Benchmark Frameworks
Mastering the Uniface Edit Statement: A Developer's Guide ๐
dev.to
ยท
14h
ยท
Discuss:
DEV
๐พ
Databases
Advice on Building Voice AI in June 2025
daily.co
ยท
4h
ยท
Discuss:
Hacker News
๐ค
AI
Pipeline Pattern in Go: Build Efficient Data Flows Like a Pro
dev.to
ยท
1h
ยท
Discuss:
DEV
๐
Columnar Engines
Show HN: I made a vencord plugin to search for messages across discord
blog.jaisal.dev
ยท
20h
ยท
Discuss:
Hacker News
๐ง
Iceberg Tables
App Security: Common Attacks & How to Prevent Them
dev.to
ยท
11h
ยท
Discuss:
DEV
๐ฆ
Malware Analysis
Show HN: Euler and Fourier = Cognition?
ryukulogos.github.io
ยท
17h
ยท
Discuss:
Hacker News
๐ก
Optical Computing
Extract Invoice Data Automatically Using LangChain
dev.to
ยท
13h
ยท
Discuss:
DEV
๐
data engineering
Building SolSistr: Features and Motivation
linkedin.com
ยท
7h
ยท
Discuss:
DEV
๐
Column Stores
๐ง Solving LeetCode Until I Become Top 1% โ Day `42`
leetcode.com
ยท
19h
ยท
Discuss:
DEV
๐ข
NumPy
Loading...
Loading more...
« Page 2
โข
Page 4 »