Forensics of the past
hexacorn.comΒ·4d
πŸ”Tape Forensics
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.coΒ·5h
πŸ›‘οΈeBPF Security
Flag this post
Show HN: DocCraft AI – Generate professional business documents
news.ycombinator.comΒ·6hΒ·
Discuss: Hacker News
πŸ“„PostScript
Flag this post
Unsupervised Learning NO. 503
newsletter.danielmiessler.comΒ·1d
πŸ•΅οΈVector Smuggling
Flag this post
Optimizing LLM Context for Vulnerability Scanning
blog.fraim.devΒ·1dΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Flag this post
Liberation of LMS-siloed Instructional Data
journal.code4lib.orgΒ·9h
πŸ”„Archival Workflows
Flag this post
Building and Deploying the Digital Humanities Quarterly Recommender System
journal.code4lib.orgΒ·9h
πŸ“šDigital Humanities
Flag this post
Deepseek's OCR system compresses image-based text so AI can handle much longer documents
the-decoder.comΒ·1d
πŸ€–Advanced OCR
Flag this post
JSON demystified: A field guide for designers
blog.murphytrueman.comΒ·11hΒ·
Discuss: Hacker News
🎨Nordic Design
Flag this post
Bolt – How Mura Wrote an In-House LLM Eval Framework
mackey.substack.comΒ·11hΒ·
Discuss: Substack
πŸ”Concolic Testing
Flag this post
A simple way to send emails using Docker and bash
adamfallon.comΒ·7hΒ·
Discuss: Hacker News
🐚Bash Combinators
Flag this post
ClapperText: A Benchmark for Text Recognition in Low-Resource Archival Documents
arxiv.orgΒ·2d
πŸ“„OCR
Flag this post
Evidence-Based Engineering: How Research Shapes My Full Stack Development Process
dev.toΒ·22hΒ·
Discuss: DEV
πŸ”„Reproducible Builds
Flag this post
Retrieval-Augmented Generation for Web Archives: A Comparative Study of WARC-GPT and a Custom Pipeline
journal.code4lib.orgΒ·9h
🌐WARC Mining
Flag this post
Data Sovereignty in a VUCA world: why flexibility matters more than absolutes
techradar.comΒ·14h
πŸ”—Data Provenance
Flag this post
Tidy Up Your Data
yakirhavin.comΒ·8hΒ·
Discuss: Hacker News
πŸ“‡Indexing Strategies
Flag this post
One Dataset, Many Formats: DeepFabric's Approach to Training Format Flexibility
dev.toΒ·1dΒ·
Discuss: DEV
βœ…Format Verification
Flag this post
The Final Step to Secure File Uploads
newsletter.ferranverdes.netΒ·1dΒ·
Discuss: Hacker News
πŸ’£Compression Security
Flag this post
AI – Real and good example of Java modernization
matteo.vaccari.nameΒ·15hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebAssembly
Flag this post
Automated Anomaly Detection in GC-MS Column Degradation via Spectral Fingerprinting & Bayesian Inference
dev.toΒ·15hΒ·
Discuss: DEV
🧲Magnetic Resonance
Flag this post