The El Ali Meteoriteโ€™s Journey from Landmark to Loot
scientificamerican.comยท16h
๐Ÿ”Tape Forensics
Flag this post
Documents are dead. What comes next?
fontoxml.comยท2d
๐Ÿ“„PostScript
Flag this post
The criminal case against John Bolton looks serious
economist.comยท1d
๐Ÿ”Format Forensics
Flag this post
Linktree: $1.3B valuation, 232 employees
research.contrary.comยท3dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Flag this post
Django, Cloudflare, Cookiecutter: A Winning Stack for Solo Founders (2024)
indiehackers.comยท14hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Flag this post
X45HY-06 High-Performance Industrial Component
hackster.ioยท1d
๐Ÿ”HSM Integration
Flag this post
VMware Workstation Pro 25H2 with USB 3.2 and New Virtual Hardware
heise.deยท8h
๐Ÿ–ฅHome Lab Setup
Flag this post
AI-driven mapping captures daily global land changes
phys.orgยท10h
๐Ÿ“ธTIFF Archaeology
Flag this post
Microsoft/Detours: A package for monitoring and instrumenting Win32 API calls
github.comยท20hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Flag this post
How to Remove Backgrounds from 50 Images in One Go Using an AI Tool
dev.toยท16hยท
Discuss: DEV
๐Ÿค–Archive Automation
Flag this post
Security Affairs newsletter Round 545 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท5d
๐Ÿ”“Hacking
Flag this post
A Multimodal Approach to Heritage Preservation in the Context of Climate Change
arxiv.orgยท22h
๐Ÿ“ธTIFF Archaeology
Flag this post
Wipro Limited (WIT) Q2 2026 Earnings Call Transcript
seekingalpha.comยท1d
๐ŸŒŠApache Kafka
Flag this post
Why Things Are The Way They Are
techdirt.comยท9h
๐Ÿ Personal Archives
Flag this post
Ancient Mummification Artifact Analysis via Hyper-Spectral Predictive Modeling for Disease Reconstruction
dev.toยท1dยท
Discuss: DEV
๐ŸบComputational Archaeology
Flag this post
Geometric optics approximation sampling: near-field case
arxiv.orgยท22h
๐Ÿ“ŠComputational Geometry
Flag this post
Show HN: I am building hostprint an agentles system information probe via SSH
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Flag this post
Qualys ETM Identity โ€” The First True Quantification of the Identity Perimeter
blog.qualys.comยท2d
๐Ÿ”—Data Provenance
Flag this post
CoT-PL: Visual Chain-of-Thought Reasoning Meets Pseudo-Labeling for Open-Vocabulary Object Detection
arxiv.orgยท22h
๐Ÿ‘๏ธConstructive OCR
Flag this post
Search โ€“ and Why It's Repeating Itself
medium.comยท15hยท
Discuss: Hacker News
๐Ÿ”Search Indexing
Flag this post