A disenshittification moment from the land of mass storage
doctorow.medium.com·16h
🧲Magnetic Philosophy
🧠 My Journey to Building the Perfect Homelab: Choosing the Right Single Board Computer Server
reddit.com·1d·
Discuss: r/homelab
🏠HomeLab
Remembering the 2000s Cell Phone Era: When Phones Were Cool and Creative
rarehistoricalphotos.com·16h·
Discuss: Hacker News
📡Bluetooth Archaeology
The People Rescuing Forgotten Knowledge Trapped On Old Floppy Disks
it.slashdot.org·7h
💽Floppy disks
#14 Logarithm ....History and Etymology of Math Terms
pballew.blogspot.com·23h·
📊APL Heritage
Autonomous architecture - problem description
disruptivearchitecture.info·20h
🌊Streaming Systems
The Fight Against Ransomware Heats Up on the Factory Floor
darkreading.com·10h
🛡Cybersecurity
These Editor-Approved Gifts Are Sure to Be a Big Win with Gamers Young and Old
popularmechanics.com·8h
🕹️Retro Gaming
I am an SSD expert – here are 5 reasons why choosing a small SSD could cost you later
techradar.com·14h
🛡️Preservation Logic
The iPhone Moment for Automotive has Arrived. Will OEMs Seize It?
qt.io·20h
🔌Interface Evolution
Meet Amazon Quick Suite: The agentic AI application reshaping how work gets done
aboutamazon.com·1d·
Discuss: Hacker News
🌊Streaming Systems
The Evolution of Sony Video
obsoletesony.substack.com·3d·
Discuss: Substack
💽MiniDisc Technology
It takes a Kraken to scan billions of source files
softwareheritage.org·2d
🏠Homelab Archaeology
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·1d
🔐Capability Systems
Phones as a Fortress: 4th Amendment Castle Doctrine for the "Digital Home"
computerweekly.com·11h·
Discuss: Hacker News
🧲Magnetic Philosophy
OWA at the EU Parliament DMA Working Group
open-web-advocacy.org·1d
🕸️WASM Archives
A Function Generator From The Past
hackaday.com·10h
Circuit Archaeology
When Apple Records sued Apple Computer
dfarq.homeip.net·1d
🍎Apple Computing
Proton VPN Review (2025): The Best VPN for Most People
wired.com·17h
Time Capsule Networks
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·8h
🎫Kerberos Attacks