๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“œ Family History Data

GEDCOM Standards, Legacy Formats, Digitization Workflows, Privacy Protection

Ultimate Lab Resource for VCF 9.0
williamlam.comยท4h
๐Ÿ HomeLab
Build Your Own Road Map for Igbo Language Digital Activism
diff.wikimedia.orgยท13h
๐ŸŒCultural Computing
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท19h
๐Ÿ›๏ธMainframe Archaeology
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท11h
๐Ÿ”ฌArchive Forensics
How data brokers shape your life
proton.meยท2d
๐Ÿ”—Data Provenance
The Guide to the Foundation Models Framework
azamsharp.comยท12hยท
Discuss: Hacker News
ฮปLambda Formalization
Imputation of Longitudinal Data Using GANs: Challenges and Implications for Classification
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
LAPD Face Search
github.comยท1dยท
Discuss: Hacker News
โš–๏ธDigital Evidence
How Not to Get Lost in PCI DSS Standards โ€” A Tech Teamโ€™s Perspective
hackernoon.comยท19h
๐Ÿ”—Data Provenance
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chยท17h
๐Ÿ—ƒ๏ธDatabase Storage
The Case for Native Iceberg Catalog APIs and Unified Governance in Object Storage
blog.min.ioยท2d
๐Ÿท๏ธMetadata Standards
Build a Data Cleaning & Validation Pipeline in Under 50 Lines of Python
kdnuggets.comยท1d
โœ…Archive Validation
Show HN: Towards agentic Graph RAG: Enhancing graph retrieval with vector search
blog.kuzudb.comยท4hยท
Discuss: Hacker News
๐Ÿ“ŠGraph Databases
Networking for Systems Administrators
mwl.ioยท13hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Privacy Tools vs Online Child Exploitation and Abuse
theprivacydad.comยท4hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Why, in 2025, do we still need a 3rd party app to write a REST API with Django?
emma.has-a.blogยท5hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Precisely Accelerates Data Integration with Overture GERS IDs
overturemaps.orgยท12h
๐Ÿ›๏ธOAIS Implementation
G7 data protection authorities call for "child protection by design"
heise.deยท2d
๐Ÿ”—Data Provenance
Compbolt: A lib with a hard to misuse API (based on Matt Godbolt)
github.comยท16hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Explaining software and computational methods
blog.khinsen.netยท1dยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Loading...Loading more...
AboutBlogChangelogRoadmap