A small rant about compression
codecs.multimedia.cx·2d
📦Deflate
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·15h
📐Compression Bounds
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·6h·
Discuss: Hacker News
📼Cassette Archaeology
A disenshittification moment from the land of mass storage
doctorow.medium.com·7h
🧲Magnetic Philosophy
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·13h
📼Tape Simulation
New Articles: Journal of Contemporary Archival Studies
archivespublishing.com·1d
⚖️Archive Ethics
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·1d
🖼️JPEG XL
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·1d
🔐Capability Systems
Decoding Cultures: Why Your Video AI Isn't Truly Seeing the World by Arvind Sundararajan
dev.to·5h·
Discuss: DEV
🌍Cultural Algorithms
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.com·4h
🔍Vector Forensics
Static Bundle Object: Modernizing Static Linking
medium.com·3d·
🔗Static Linking
Reliability in Finance: Delivering Quality Market Data at Scale
usenix.org·15h
🌊Stream Processing
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
No Bullshit Guide to Statistics prerelease
minireference.com·1h
🧮Kolmogorov Bounds
QUIC! Jump to User Space!
hackaday.com·3h
🌐Network Protocols
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
If Anyone Builds It, Everyone Dies: my review
haggstrom.blogspot.com·6h·
🔲Cellular Automata