Bibliographic Data, Library Catalogs, Metadata Exchange, Cultural Heritage

Facing historical suffering: My experience discovering the Hispanic Reading Room’s Pamphlet Collection
blogs.loc.gov·5d
📕Bookbinding
ELA-1534-1 freeipa security update
freexian.com·5h
🎫Kerberos Exploitation
Henry Moon Pie: Time to Support a Reader-Supporting Site
nakedcapitalism.com·1d
📡RSS Readers
LLM Prompt Fixed Point: the Ultimate Prompt
funcall.blogspot.com·1d·
Automated Theorem Proving
Notice: Brief Server Downtime Overnight
phoronix.com·1d
🛡Cybersecurity
An Alternative to Cryonics:An Introduction to Sparks Brain Preservation
biostasis.substack.com·17h·
Discuss: Substack
🌡️Preservation Thermodynamics
AI wrote nearly a quarter of press releases in 2024
eurekalert.org·1d·
Discuss: Hacker News
🎙️Whisper
Building a List in C++ – LLM Part 1
amitav.net·3d·
Discuss: Hacker News
🔗Concatenative Programming
The "Phantom Author" in our codebases: Why AI-generated code is a ticking time bomb for quality.
medium.com·1d
🚀Indie Hacking
Last Week on My Mac: Has macOS virtualisation ground to a halt?
eclecticlight.co·9h
🍎Apple Archive
Myth Busters: Is Rust a Slam Dunk?
infoq.com·21h·
Discuss: Hacker News
🦀Embedded Rust
Here comes the bride? More like here comes the debt.
artcrimearchive.net·1d
Church Encoding
Research assessment: a round-up for early-career researchers
nature.com·3d
🔬Academic Search
Adding a New TOML Feature, using Git Remotes and Merges on a repository.
dev.to·1d·
Discuss: DEV
🌳Git Internals
Exploring the Intricacies of Memory with Ada Limón
newyorker.com·3d
🏛Digital humanities
Looking for 2.5inch or M.2 enclosure with eSATA
reddit.com·1d·
Discuss: r/homelab
🏠Homelab Preservation
The Media Bias Detector: A Framework for Annotating and Analyzing the News at Scale
arxiv.org·4d
📥Feed Aggregation
BloomAPR: A Bloom's Taxonomy-based Framework for Assessing the Capabilities of LLM-Powered APR Solutions
arxiv.org·4d
🌸Bloom Variants
AI Code Assistants Are Copying GPL Code Into Your Product (And You'll Get Sued)
dev.to·8h·
Discuss: DEV
🚀Indie Hacking