Preservation Mathematics, Storage Theory, Formal Archival, Mathematical Curation

The human stain remover: what Britain’s greatest extreme cleaner learned from 25 years on the job | Tom Lamont
theguardian.com·8h
🔍Disk Forensics
Directory Listings with Foundry
blogs.gnome.org·1d
Bidirectional Programming
This is where I write my Journal on my iPhone
phong.bearblog.dev·8h·
Discuss: Hacker News
🏠Personal Archives
Show HN: Banker – Lovable for Spreadsheets
banker.so·1h·
Discuss: Hacker News
🗃️Database Storage
Getting Work Done Anywhere, Every Day
lelandbatey.com·3d·
Discuss: Hacker News
📲syncthing
Electronic Reporting Using SM2-Based Ring Signcryption
arxiv.org·9h
🔐Homomorphic Encryption
Building Your First MCP Server: From Zero to AI-Powered Enterprise Tools
dev.to·23h·
Discuss: DEV
🌊Streaming Systems
Hyperbolic Sets in Incomplete Tables
arxiv.org·9h
🌀Hyperbolic Geometry
Shape-induced obstacle attraction and repulsion during dynamic locomotion
arxiv.org·9h
🔲Cellular Automata
B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G Roaming
arxiv.org·9h
🌳Archive Merkle Trees
Privacy-Preserving State Estimation with Crowd Sensors: An Information-Theoretic Respective
arxiv.org·9h
🛡️Differential Privacy
Naive Bayes Algorithm: Origins, Real-World Applications, and Case Studies
dev.to·3h·
Discuss: DEV
🧮Kolmogorov Bounds
Learning functions, operators and dynamical systems with kernels
arxiv.org·9h
🧠Machine Learning
Assessing metadata privacy in neuroimaging
arxiv.org·1d
🔒Privacy Archives
How To Hide Secrets & Exe Payloads In Images (Guide)
dev.to·23h·
Discuss: DEV
🦠Parasitic Archives
Deep Synthetic Cross-Project Approaches for Software Reliability Growth Modeling
arxiv.org·9h
📏Code Metrics
Variation in Verification: Understanding Verification Dynamics in Large Language Models
arxiv.org·9h
🧪Binary Fuzzing
Public Key Encryption with Equality Test from Tag-Based Encryption
arxiv.org·9h
🔲Lattice Cryptography