Proton Might Recycle Abandoned Email Addresses
yro.slashdot.org·3h
🏠self hosting
Flag this post
25 Years of Conversation, Connection, and Community: Celebrating the DPC Discussion List
dpconline.org·2d
🇪European data sovereignty
Flag this post
How to Not Burn Your House Down With a Space Heater
nytimes.com·7h
🏠self hosting
Flag this post
Getting Started with Requestly’s Local Workspace: API Testing Offline and On Your Terms
🏠self hosting
Flag this post
Differentially private machine learning at scale with JAX-Privacy
research.google·1d
🔓opende source
Flag this post
Radio Apocalypse: Survivable Low-Frequency Communication System
hackaday.com·1d
🏠self hosting
Flag this post
Building checksec without boundaries with Checksec Anywhere
blog.trailofbits.com·9h
🔓opende source
Flag this post
Copier Uptime Without the Drama: A Practical Playbook for Offices That Hate Fire Drills
🔓opende source
Flag this post
Help Picking a New Light
🔓opende source
Flag this post
Digital rearmament: The Bundeswehr is looking for IT experts
heise.de·1h
🇪European data sovereignty
Flag this post
Self Hosted CRM for field tech service appointments and very simple/basic quickbooks integration
🏠self hosting
Flag this post
Four arrested for piracy
🇪European data sovereignty
Flag this post
I replaced my Linux desktop with Fedora Silverblue, and it feels futuristic
xda-developers.com·2d
🔓opende source
Flag this post
Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats
🇪European data sovereignty
Flag this post
Near telomere to telomere genome assembly of Chinese yellow rabbit (<i>Oryctolagus cuniculus</i>)
nature.com·1h
🔓opende source
Flag this post
Amazon steps up attempts to block illegal sports streaming via Fire TV Sticks
🏠self hosting
Flag this post
Adaptive Edge Intelligence Framework for Predictive Maintenance in Azure IoT Hub Microservices
🇪European data sovereignty
Flag this post
How Merkle Science fights crypto crime at scale with ClickHouse Cloud
clickhouse.com·11h
🇪European data sovereignty
Flag this post
Real-time knowledge- and data-driven reliability analysis for lithium-ion battery energy storage system by Bayesian fault propagation network
sciencedirect.com·2d
🇪European data sovereignty
Flag this post
Top 5 network security tools to protect your business
proton.me·2d
🇪European data sovereignty
Flag this post
Loading...Loading more...