Cyber Humanities for Heritage Security
cacm.acm.org¡1d
đCultural Informatics
Flag this post
Degradation-Aware Hierarchical Termination for Blind Quality Enhancement of Compressed Video
arxiv.org¡2d
đRate-Distortion Theory
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
đDependency Resolution
Flag this post
Atari Gamestation Go review: 200+ Atari classics in your hands, supported by a unique selection of physical controls
tomshardware.com¡17h
đšī¸Retro Gaming
Flag this post
Static web hosting performance on Intel N150 compared across BSDs and Linux
discoverbsd.com¡2d
đOperating system internals
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org¡2d
đēFormat Archaeology
Flag this post
Olmo 3 is a fully open LLM
simonwillison.net¡7h
đBrotli Internals
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
đOperating system internals
Flag this post
Decommissioning legacy systems - reducing risks, costs & unlocking the value of long-term archival content
preservica.com¡5d
đ°Preservation Economics
Flag this post
Three New Organisations Join the Our Future Memory Movement
internetarchive.eu¡1d
âī¸Archive Ethics
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
đText Chunking
Flag this post
Is DWPD Still a Useful SSD Spec?
đžPersistent Memory
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com¡1d
đ¯NTLM Attacks
Flag this post
Thoughts on the GigaOm Radar for Vector Databases v3
thenewstack.io¡1d
đī¸Vector Search
Flag this post
Maybe somebody can explain to me how weak references solve the ODR problem
devblogs.microsoft.com¡1d
đStatic Linking
Flag this post
Google's Nested Learning aims to stop LLMs from catastrophic forgetting
the-decoder.com¡11h
đģLocal LLMs
Flag this post
Loading...Loading more...