Bridging Theory and Practice: My Journey into Library UX in Finding Aids and Digital Collections at U-M Library
blogs.lib.umich.edu·2d
📚MARC Records
How Ente Changed the Way I See Photos
ente.io·8h
🏠Personal Archives
Podcast Rewind: From AirPods Pro 3 to AYANEO’s Budget Handheld and Pok Pok’s Backstory
macstories.net·2d
🍎Apple Archive
The Art of Being Right - Wikipedia
en.m.wikipedia.org·2d
🏛️Philosophy
Treat those who give you things well!
rubenerd.com·3d
⚖️Emulation Ethics
Conversations With Enterprise Product and Engineering Teams Has Given Me More Empathy About This Moment In Tech
apievangelist.com·1d
🔌Interface Evolution
Show HN: Fast API for Data Cleaning
getflookup.com·14h·
Discuss: Hacker News
🔍BitFunnel
AROS Vision – Modern and Free Amiga-Compatible Experience on Amiga and PC
aros-vision.de·2d·
Discuss: Hacker News
🎵Amiga Formats
Build a Data Dashboard Using HTML, CSS, and JavaScript
towardsdatascience.com·18h
🗄️Database Internals
Apex: AI Productivity Index for investment banking, law, consulting, medical
mercor.com·20h·
Discuss: Hacker News
Proof Automation
Amazon is relaunching Luna with new social features and family-friendly gaming
techspot.com·2d
🏺Gaming Archaeology
A Case for Generative AI?
medium.com·54m·
Discuss: Hacker News
🌀Brotli Internals
The good, the bad, and the future of AI agents
theverge.com·1d
🤖AI Curation
🚀 Launching SoraAI.run – Generate Sora AI Videos Without Invites or Watermarks
dev.to·1d·
Discuss: DEV
🎬AV1 Encoding
Gendered Inequalities in Online Harms: Fear, Safety Work, and Online Participation
arxiv.org·1d
🛡Cybersecurity
OOP and SOLID in python
dev.to·1d·
Discuss: DEV
🔗Constraint Handling
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·1d·
Discuss: Hacker News
📼Cassette Hacking
Building Blocks of Awareness: A Modular Approach to Artificial Minds by Arvind Sundararajan
future.forem.com·20h·
Discuss: DEV
🧠Intelligence Compression