The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Announcing the 2025 NDSA Excellence Award Winners
ndsa.org·12h
🏛️PREMIS Metadata
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.com·1h
🌊Stream Processing
A disenshittification moment from the land of mass storage
doctorow.medium.com·13h
🧲Magnetic Philosophy
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.org·21h
🎵Audio Formats
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·19h
📼Tape Simulation
Announcing coreboot 25.09 release
blogs.coreboot.org·1h
🔌Operating system internals
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·15h
💎Information Crystallography
Building Repo Bench
repoprompt.com·1d·
Proof Automation
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·12h·
📼Cassette Archaeology
Welcome to LIL’s Data.gov Archive Search
lil.law.harvard.edu·5h
💾Data Preservation
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
The Day I Hacked XCTrack
blog.syrac.org·10h·
Discuss: Hacker News
🔐PKI Archaeology
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Running new applications on old glibc
lightofdawn.org·1d·
Discuss: Hacker News
🔗Static Linking
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com·3d
🔓Decompilation
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·2d·
Discuss: DEV
👁️Perceptual Hashing
Two Kinds of "Relicensing"
writing.kemitchell.com·1d·
🌳Archive Merkle Trees