Digital Rights, Preservation Philosophy, Access Policies, Cultural Heritage, Legal Frameworks

With thanks to Steven Rosenberg
rubenerd.com·9h
📰RSS Archaeology
Flag this post
Volcanologists Turn to a High-Tech Suitcase to Study Eruptions
spectrum.ieee.org·14h
🧊Arctic Storage
Flag this post
Is RSS Still Relevant?
idiallo.com·2d·
Discuss: Hacker News
📰RSS Reading Practices
Flag this post
What is the most durable, portable, and secure form of software?
gods.art·3d·
Discuss: Hacker News
🕸️WebAssembly
Flag this post
"You Don't Need Kafka, Just Use Postgres" Considered Harmful
morling.dev·14h·
🌊Streaming Databases
Flag this post
Experts find flaws in hundreds of tests that check AI safety and effectiveness
theguardian.com·7h
🧠Intelligence Compression
Flag this post
The Year of a Thousand Rooms
dxdt.ch·12h·
Discuss: Hacker News
🌍Cultural Algorithms
Flag this post
PocketBook – DIY pocket-sized Project Gutenberg books
github.com·9h·
Discuss: Hacker News
📕Bookbinding
Flag this post
Learn to Capitalize the First Letter of Each Word with Go
dev.to·7h·
Discuss: DEV
🔗Concatenative Programming
Flag this post
Protean Funds Scandinavia AB October 2025 Partner Letter
seekingalpha.com·3h
⚙️Swedish Assembly
Flag this post
How Low-Code/No-Code Platforms Are Powering Hyperautomation Across Enterprises
dev.to·1h·
Discuss: DEV
⚙️Modern Assembly
Flag this post
How I Use AI to Build Frontend Apps: My Candid, Messy Process
dev.to·5h·
Discuss: DEV
🌍Cultural Algorithms
Flag this post
Reflections on Open Science and Public Engagement from the 4th UN Open Science Conference
diff.wikimedia.org·4d
🌱Personal Wikis
Flag this post
GitHub Issue Monitor AI Agent with Mastra
dev.to·1d·
Discuss: DEV
gRPC
Flag this post
Quoting Steve Francia
simonwillison.net·4h
🧮Theoretical Computer Science
Flag this post
Position: Vibe Coding Needs Vibe Reasoning: Improving Vibe Coding with Formal Verification
arxiv.org·2h
Formal Methods
Flag this post
Deploy AI Applications on Google Colab - No Cost, No Server Needed
dev.to·21h·
Discuss: DEV
🌀Brotli Internals
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·1d
💣ZIP Vulnerabilities
Flag this post