🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“œ Family History Data

GEDCOM Standards, Legacy Formats, Digitization Workflows, Privacy Protection

CFP: Ethical AI in GLAM: Challenges and Opportunities for Digital Stewardship
archivespublishing.comΒ·13h
πŸ›Digital humanities
DNS at IETF 123
potaroo.netΒ·5h
🌐DNS Security
What's Going on with SSA's "Death Master File"?
resources.sentilink.comΒ·9hΒ·
Discuss: Hacker News
πŸ”—Data Provenance
Cycle 14 (2025) Collection Comparison Reports Now Available
cdlib.orgΒ·9h
πŸ›οΈOAIS Implementation
A Start Of A Journey: BillsTechDeck
dev.toΒ·18hΒ·
Discuss: DEV
πŸ“‘RSS Automation
pdfRest Launches New Sign PDF API Tool for Legally Compliant Digital Signatures
pdfa.orgΒ·1d
πŸ“„PDF Archaeology
Charity shreds 'irreplaceable' adoption files to save space
bbc.comΒ·23h
πŸ’ΎData Preservation
Why Most eDiscovery Tools and Online Archiving Offerings Are Terrible for Information Governance
blog.x1discovery.comΒ·11h
πŸ”—Data Provenance
Revitalizing UK History: Enriching Wikidata for Diverse Historical Figures
diff.wikimedia.orgΒ·1d
πŸ“‡Dublin Core
What I Learned From Downloading My Poshmark Data (and Where to Find Yours)
lifehacker.comΒ·7h
πŸ”—Data Provenance
Analysing Snapshot Isolation
muratbuffalo.blogspot.comΒ·15hΒ·
Discuss: www.blogger.com
🌳Persistent Data Structures
The Kivaloo Data Store
tarsnap.comΒ·4hΒ·
Discuss: Hacker News
πŸ“¦METS Containers
Show HN: Using DSPy to enrich a dataset of the Nobel laureate network
blog.kuzudb.comΒ·1dΒ·
Discuss: Hacker News
πŸ“ŠCitation Graphs
Stakeholder Perspectives on Digital Twin Implementation Challenges in Healthcare: Insights from a Provider Digital Twin Case Study
arxiv.orgΒ·1d
πŸ“„Document Digitization
From face scans to credit checks: how UK age verification works and why it’s a privacy nightmare
techradar.comΒ·1d
πŸ”Homomorphic Encryption
New research software beginner guides supporting social science researchers now available
software.ac.ukΒ·18h
πŸ”¬Academic Search
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.euΒ·21h
βœ…Archive Validation
Remembrance Agent A continuously running automated information retrieval system
bradleyrhodes.comΒ·7hΒ·
Discuss: Hacker News
πŸ”Information Retrieval
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comΒ·14h
πŸ’ΏDAT Forensics
Tackling the Mobile Data Deluge: Lessons from Masters Conference NYC 2025
cloudnine.comΒ·1d
🚨Incident Response
Loading...Loading more...
AboutBlogChangelogRoadmap