AI and the strengthening of records management approaches
thinkingrecords.co.uk·1d
📐Archive Calculus
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.com·1d
🔗Combinatory Logic
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.com·3h·
🗂Data structures
Flag this post
Oops, My UUIDs Collided
alexsci.com·3h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
De Bruijn Numerals
text.marvinborner.de·1d·
Discuss: Hacker News
λLambda Encodings
Flag this post
Building Up And Sanding Down
endler.dev·22h
🔩Systems Programming
Flag this post
Central Submonads and Notions of Computation: Soundness, Completeness and Internal Languages
arxiv.org·18h
🧮Algebraic Archives
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.com·6h·
Discuss: Hacker News
👁️Observatory Systems
Flag this post
A chat with Elizabeth Goodspeed, Casual Archivst
flickr.org·1d
🌐Archive Topology
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.io·2h
🌊Streaming Systems
Flag this post
Never Forget a Thing: Building AI Agents with Hybrid Memory Using Strands Agents
dev.to·11h·
Discuss: DEV
💾Persistence Strategies
Flag this post
Three Realisms and The Idea of Sheaves
youtube.com·1d
🧮Theoretical Computer Science
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.com·7h
📄Document Digitization
Flag this post
The internet was made for privacy
doctorow.medium.com·6h
🧲Magnetic Philosophy
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·22h
🔓Decompilation
Flag this post
Registry Analysis
windowsir.blogspot.com·9h·
🔍NTLM Archaeology
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·15h
🔐Hash Functions
Flag this post
Place Capability Graphs: A General-Purpose Model of Rust's Ownership & Borrowing
dl.acm.org·1d·
🦀Rust Borrowing
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
λLambda Formalization
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·2h·
Discuss: Hacker News
Proof Automation
Flag this post