How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
💾Local-First Software
Flag this post
Q&A: Dianne Connery and Rural Libraries
dailyyonder.com·3h
💾Local-First Software
Flag this post
Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data
pogowasright.org·2h
⚖️Digital Rights
Flag this post
Free AI and Data Courses with 365 Data Science—100% Unlimited Access until Nov 21
machinelearningmastery.com·23h
💾Local-First Software
Flag this post
Broken Telescopes
takimag.com·9h
🏴anarchism
Flag this post
GPTF-8: A tokenizer-based character encoding
lesswrong.com·7h
📡RSS Feeds
Flag this post
Thursday open line
arktimes.com·16h
📡RSS Feeds
Flag this post
Ownership of Digital Content Is an Illusion—Unless You Self‑Host
news.itsfoss.com·1d
⚖️Digital Rights
Flag this post
Caption Injection for Optimization in Generative Search Engine
arxiv.org·9h
🕸️Indie Web
Flag this post
The Global Bit List of Endangered Digital Materials: An Imperative to Safeguard Our Digital Legacy
dpconline.org·1d
⚖️Digital Rights
Flag this post
Improving Gene Trees without more data
arxiv.org·1d
🗺️OpenStreetMap
Flag this post
Umami 3.0
🌐Fediverse
Flag this post
Starting with Why...
dpconline.org·1d
🌐Fediverse
Flag this post
Distributed Media Inferencing with Kafka
🌐Fediverse
Flag this post
How the plastics industry shifted responsibility for recycling onto you, the consumer
phys.org·23h
🏴anarchism
Flag this post
Loading...Loading more...