Automated Anomaly Detection in Cosmic Microwave Background Polarization Maps via Optimized Wavelet Transform Regression
dev.toยท20hยท
Discuss: DEV
๐Ÿ“ŠDocument Wavelets
<h2>Resurrected - Two Latin Texts</h2>
naomiceder.techยท2h
๐Ÿ”คFont Archaeology
Systematic fraud uncovered in mathematics publications
phys.orgยท11h
๐Ÿ“šArchive Mathematics
WorldCat Editions and Holdings Release
annas-archive.orgยท1dยท
Discuss: Hacker News
๐Ÿ“šMARC Records
Fastest copy
forums.anandtech.comยท11h
๐Ÿ“„Document Digitization
libwmf v0.2.13 Integer Overflow in libwmf Left-Shift Operations (wmf.c, fig.c, svg.c)
seclists.orgยท1h
โœ…Format Verification
Weasel words and co.: Guide to recognising AI-generated texts on Wikipedia
heise.deยท11h
๐Ÿ“œBinary Philology
Drummond Rennie (1936-2025), in his own words
retractionwatch.comยท10h
๐ŸฐManuscript Networks
Detecting Active Directory Password Spraying Article
adsecurity.orgยท8h
๐ŸขActive Directory
Gucci, Balenciaga and Alexander McQueen private data ransomed by hackers
bbc.comยท13h
๐Ÿ”—Data Provenance
Preserving the digital legacy of company archives: Last stop, Newhaven.
dpconline.orgยท20h
๐Ÿ’พData Preservation
OTW - Bandit Level 4 to Level 5
tbhaxor.comยท22h
๐Ÿ”งKAITAI
Scientists Discover Massive DNA โ€œInoclesโ€ Living in the Human Mouth
scitechdaily.comยท14h
๐Ÿ”„Burrows-Wheeler
Internet Archive and Major Labels Settle $621 Million Copyright Lawsuit
rollingstone.comยท8h
๐ŸŽตAudio Archaeology
DF/IR Isnโ€™t About Computers. Itโ€™s About Hunting Humans.
brettshavers.comยท2d
๐Ÿ”—Data Provenance
Whatโ€™s new?
rhollick.wordpress.comยท13h
๐Ÿ“šMARC Archaeology
Balance between refactoring and inheritance in your code
github.comยท16hยท
Discuss: Hacker News
โœ…Format Verification
Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web (2017)
scholarship.law.bu.eduยท1dยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Bookends 15.2
tidbits.comยท12h
๐Ÿ“„PostScript