School cell phone ban creates surge in JCPS library visits
wave3.comΒ·4hΒ·
Discuss: Hacker News
πŸ“„Document Digitization
Open Science round-up: The future of knowledge and who should control it - International Science Council
council.scienceΒ·1d
🧲Magnetic Philosophy
MAPSS: Manifold-based Assessment of Perceptual Source Separation
arxiv.orgΒ·1d
πŸ‘οΈPerceptual Coding
Expanding scientific access to biodiversity data
phys.orgΒ·1d
🦴Database Paleontology
How Social Media Turned Charlie Kirk’s and Iryna Zarutska’s Murder Into Spectacle
nytimes.comΒ·4h
🧲Magnetic Philosophy
LLMs as Retrieval and Recommendation Engines
medium.comΒ·22hΒ·
Discuss: Hacker News
πŸ”Information Retrieval
Maria-Romina Ivan and Sean Jaffe: The saturation number for the diamond is linear
gilkalai.wordpress.comΒ·15h
πŸ’ŽInformation Crystallography
Best infosec-related long reads for the week of 9/6/25
metacurity.comΒ·3h
πŸ›‘Cybersecurity
Worldcat editions and holdings release
annas-archive.liΒ·2d
πŸ“šMARC Records
Meet the Mentors, Introduced by the 2025 Cohort
ica.orgΒ·2d
βš–οΈArchive Ethics
Rimmer - Kind Librarian: Cultivating a Culture of Kindness and Wellbeing in Libraries [Elektronisk resurs]
libris.kb.seΒ·3d
βš–οΈArchive Ethics
Whither the Dictionary?
theatlantic.comΒ·1h
πŸ”BitFunnel
Sindhi Halchal Archive: Building on the PG Sindhi Library
digitalorientalist.comΒ·1d
🌐Web Archiving
A Shadow of Triality?
golem.ph.utexas.eduΒ·3h
πŸ”²Proof Irrelevance
Walking the line between broad scope and lack of legal certainty (T 2387/22)
ipkitten.blogspot.comΒ·23hΒ·
πŸ”²Proof Irrelevance
What is SOC 2 Compliance? A Complete Guide for Security Leaders
securityscorecard.comΒ·19h
🎯Threat Hunting
Atlassian Corporation (TEAM) Presents At Goldman Sachs Communacopia + Technology Conference 2025 Transcript
seekingalpha.comΒ·1d
🌊Streaming Systems
IT security: BSI gives tips on Microsoft Office – and warns of "residual risks"
heise.deΒ·20h
πŸ”€EBCDIC Privacy
Unifying Business Intelligence Through System Integration
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”—Data Provenance