Decommissioning legacy systems - reducing risks, costs & unlocking the value of long-term archival content
preservica.com·5d
💰Preservation Economics
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org·2d
🏺Format Archaeology
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
Evolution Strategies at the Hyperscale
🔲Cellular Automata
Flag this post
Data General History by Foster
🔗Data Provenance
Flag this post
Why your no-code tool might be corrupting data
🔀CRDT
Flag this post
How To Build a Graph-Based Recommendation Engine Using EDG and Neo4j
towardsdatascience.com·1d
🕸️Neo4j
Flag this post
Hachi: An Image Search Engine
🌐Federated Search
Flag this post
Data Science Weekly – Issue 626
🧪Data science
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
Testing Out Time Travel with DuckLake
🌳B-tree Archaeology
Flag this post
Management Pseudo-Science
📏Code Metrics
Flag this post
Automated Regulatory Compliance Risk Assessment via Multi-Modal Knowledge Graph Fusion & Explainable AI
🔗Constraint Handling
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
✅Format Validation
Flag this post
Loading...Loading more...