Feeds to Scour
SubscribedAll
Scoured 15542 posts in 325.1 ms
FEATURE - Building Frameworks for Long-Term Digital Preservation
infotoday.comยท1d
๐Ÿ›๏ธOAIS Implementation
Preview
Report Post
Tracing the Data Trail: A Survey of Data Provenance, Transparency and Traceability in LLMs
arxiv.orgยท3h
๐Ÿ›ก๏ธProof-Carrying Data
Preview
Report Post
Software Heritage Archive recognized as a digital public good
softwareheritage.orgยท23h
๐Ÿ”“Open Source Software
Preview
Report Post
CodeSOD: Validation Trimmed Away
thedailywtf.comยท1d
โœ…Format Validation
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.comยท19hยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Preview
Report Post
22.00.0180 Backups aren't enough: create 'restore points'
johnnydecimal.comยท1h
๐Ÿ’ฟBackup Strategies
Preview
Report Post
Values of the world, unite!
jemarch.netยท1d
๐Ÿ”งBinary Parsers
Preview
Report Post
ArchAgent: Scalable Legacy Software Architecture Recovery with LLMs
arxiv.orgยท1d
๐Ÿ”—Archive Combinators
Preview
Report Post
Tools I use
prepend.comยท1d
๐Ÿ”ŒOperating system internals
Preview
Report Post
Rubrik, Inc. (RBRK) Presents at Data Recovery Summit Transcript
seekingalpha.comยท8h
๐Ÿ—„๏ธDatabase Recovery
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.comยท4h
๐Ÿ”—Data Provenance
Preview
Report Post
Keep it Simple: A Conversation with Greg Wiedeman
saaers.wordpress.comยท15h
๐Ÿ”„Archival Workflows
Preview
Report Post
The challenges of soft delete
atlas9.devยท2dยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Preview
Report Post
Commercial Value of Archives - Experts Roundtable Discussion
fiatifta.orgยท19h
๐Ÿ’ฐArchive Economics
Preview
Report Post
Forward to the Past: The Y2K38 Problem Ahead
bitsight.comยท11h
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Designing a Programming Language for the Desert
futhark-lang.orgยท16hยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
Preview
Report Post
commercial_unixes
wiki.tuhs.orgยท1d
๐Ÿง™โ€โ™‚๏ธUnix Operating Systems
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.ioยท1d
๐Ÿ”ฌBinary Analysis
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท20h
๐Ÿ“ŠStatic Analysis
Preview
Report Post
The IRR Landscape: Data Quality - the Good, the Bad, and the Outdated
labs.ripe.netยท1d
๐Ÿ“กBGP Archaeology
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help