Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Digital Preservation
OAIS Model, Migration Strategies, Emulation, Bit Rot
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23835
posts in
355.4
ms
Machine learning reveals hidden
landscape
of
robust
information storage
phys.org
·
1d
⚛️
Quantum Storage
Frugal
AI
ainowinstitute.org
·
1d
🌍
Cultural Algorithms
Infrastructure as Code in
Practice
: What It
Solves
— and What It Doesn’t
hackernoon.com
·
1d
🧱
Immutable Infrastructure
Europe’s Open Source
Opportunity
: our vision for the EU Open Digital
Ecosystems
strategy
opensource.org
·
1d
🔓
Open Source Software
From
Multi-sig
to
DLCs
: Modern Oracle Designs on Bitcoin
arxiv.org
·
23h
🔗
Hash Chains
How One Engineer Turned Saudi Cloud
Compliance
from a 6-Month
Bottleneck
into a 2-Week Workflow
hackernoon.com
·
1d
🔍
BitFunnel
Object
permanence
doctorow.medium.com
·
2d
🛡️
Preservation Logic
Building Hybrid Search for RAG: Combining
pgvector
and Full-Text Search with
Reciprocal
Rank Fusion
dev.to
·
17m
·
Discuss:
DEV
🔍
Semantic Search
A Behavioral Fingerprint for Large Language Models:
Provenance
Tracking via
Refusal
Vectors
arxiv.org
·
23h
💻
Local LLMs
Show HN: Latent-k –
Persistent
dependency
map to reduce AI coding token usage
latentk.org
·
15h
·
Discuss:
Hacker News
💻
Local LLMs
Backup
restoration
and migration
lemmy.world
·
2d
💿
Backup Strategies
OpenBSD
libexpat
errata
patches released for 7.7 and 7.8
discoverbsd.com
·
2d
🔌
Operating system internals
The LLM
Context
Tax: Best Tips for Tax
Avoidance
nicolasbustamante.com
·
9h
·
Discuss:
Hacker News
🤖
Archive Automation
GUID
/
UUID
V7 - Unix Time-Ordered Identifier (Recommended)
guidsgenerator.com
·
1d
·
Discuss:
Hacker News
📋
DFDL
Main
Content ||
Math
∩ Programming
jeremykun.com
·
3d
🧮
Kolmogorov Complexity
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
Sneaky
quokka
: Testing and debugging with LLMs
honnibal.dev
·
1d
🧪
Binary Fuzzing
My
Oldest
File
marv.paperboat.website
·
1d
·
Discuss:
Hacker News
🗃
archives
Everything I know about good system design
seangoedecke.com
·
2d
🗄️
Database Internals
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
2d
·
Discuss:
Hacker News
✅
Archive Fixity
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help