Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ญCultural Informatics
Flag this post
Degradation-Aware Hierarchical Termination for Blind Quality Enhancement of Compressed Video
arxiv.orgยท2d
๐Rate-Distortion Theory
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
๐Operating system internals
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgยท2d
๐บFormat Archaeology
Flag this post
Atari Gamestation Go review: 200+ Atari classics in your hands, supported by a unique selection of physical controls
tomshardware.comยท16h
๐น๏ธRetro Gaming
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netยท5h
๐Brotli Internals
Flag this post
Static web hosting performance on Intel N150 compared across BSDs and Linux
discoverbsd.comยท2d
๐Operating system internals
Flag this post
Decommissioning legacy systems - reducing risks, costs & unlocking the value of long-term archival content
preservica.comยท5d
๐ฐPreservation Economics
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
๐Dependency Resolution
Flag this post
Three New Organisations Join the Our Future Memory Movement
internetarchive.euยท1d
โ๏ธArchive Ethics
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
๐Text Chunking
Flag this post
Is DWPD Still a Useful SSD Spec?
๐พPersistent Memory
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comยท1d
๐ฏNTLM Attacks
Flag this post
Thoughts on the GigaOm Radar for Vector Databases v3
thenewstack.ioยท1d
๐๏ธVector Search
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Quantum Security
Flag this post
Maybe somebody can explain to me how weak references solve the ODR problem
devblogs.microsoft.comยท1d
๐Static Linking
Flag this post
Loading...Loading more...