Active
Recent
Comments
Search
Login
Login
blog.dshr.org: 16 stories from 14 submitters
1
Yet Another DNA Storage Technique
science
blog.dshr.org
via
napkindrawing
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
16
Unreliability At Scale
compsci
hardware
blog.dshr.org
via
crazyloglad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Silent Data Corruption: Unreliability at Scale
devops
distributed
hardware
blog.dshr.org
via
creature
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
1
Liability In The Software Supply Chain
law
security
blog.dshr.org
via
derek-jones
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
31
Bill Shannon RIP
historical
person
unix
blog.dshr.org
via
inactive-user
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
17
Blockchains: What's Not to Like?
distributed
merkle-trees
blog.dshr.org
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
15
The Decentralized Web Failed Because of Economics, Not Technology
culture
distributed
blog.dshr.org
via
inactive-user
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
7
The Four Most Expensive Words in the English Language
merkle-trees
networking
blog.dshr.org
via
gerikson
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
ASICs and Mining Centralization
merkle-trees
performance
practices
blog.dshr.org
via
derek-jones
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
Has Web Advertising Jumped The Shark?
web
blog.dshr.org
via
tokenrove
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
16
Storage Will Be Much Less Free Than It Used To Be (2014)
finance
hardware
blog.dshr.org
via
unbalancedparentheses
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
2
Emulation & Virtualization as Preservation Strategies
☶
law
virtualization
web
blog.dshr.org
via
mjn
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Securing WiFi routers
law
networking
security
blog.dshr.org
via
apy
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Brittle systems
compsci
distributed
merkle-trees
blog.dshr.org
via
apy
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Selling your life to the IoT
culture
hardware
security
blog.dshr.org
via
derek-jones
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Krste Asanović Keynote at FAST14
☶
distributed
hardware
blog.dshr.org
via
mikemccracken
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0