🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💰 Archive Economics

Storage Cost Models, Preservation ROI, Resource Planning, Budget Optimization

Kafka Fundamentals: kafka retention.ms
dev.to·4h·
Discuss: DEV
🌊Streaming Systems
Call for Participants: Regional Training Programme “Emergency Response for Documentary Heritage”
ica.org·1d
💾Data Preservation
Greedy Is Good. Less Greedy May Be Better
gojiberries.io·13h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.ch·5h
🗃️Database Storage
5 Cloud Storage Best Practices for AI Workloads
backblaze.com·22h
💾Persistence Strategies
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.com·8h
📝Concrete Syntax
WD escapes half a billion in patent damages as judge trims award to $1
theregister.com·20h
💿WORM Storage
Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.com·1d
🔄Archival Workflows
Toward Decision-Oriented Prognostics: An Integrated Estimate-Optimize Framework for Predictive Maintenance
arxiv.org·10h
🌡️Preservation Entropy
National Archives to restrict public access starting July 7
archives.gov·17h·
Discuss: Hacker News
🌡️Archive Physics
About to Take the Plunge - Any Final Words of Advice?
bargainhardware.co.uk·53m·
Discuss: r/homelab
🔒Hardware Attestation
5 huge stumbling blocks to legacy mainframe EOL
techradar.com·7h
🏛️Mainframe Archaeology
Preservica and Gravity Union Partner to Streamline Long-Term Data Archiving and Governance in Microsoft 365 for Canadian Organizations
preservica.com·5h
🏛️PREMIS Metadata
NREL Maps Out US Data Infrastructure
hackaday.com·12h
📦METS Standards
How keys are used in FileVault and encryption
eclecticlight.co·8h·
Discuss: Lobsters
💣Compression Security
Software Heritage: The next chapter
softwareheritage.org·1h
🏛️OAIS Implementation
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·21m·
Discuss: Hacker News
📋DFDL
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·17h
🔗Data Provenance
Survey Statistics: Poststratification ?
statmodeling.stat.columbia.edu·18h
🎯Arithmetic Coding Theory
Slashing CI Costs at Uber
uber.com·4h·
Discuss: Hacker News
🔄Reproducible Builds
Loading...Loading more...
AboutBlogChangelogRoadmap