Wanless, Alicia. - The Information Animal. [Elektronisk resurs] : Humans, Technology and the Competition for Reality.
libris.kb.seยท2d
๐Ÿ self hosting
Flag this post
Things you wish you didn't need to know about AWS service-linked roles
plerion.comยท14hยท
Discuss: Hacker News
๐Ÿ self hosting
Flag this post
Iceland Warns Slower AMOC Is A Security Threat To The Nation
cleantechnica.comยท18h
๐Ÿ”“opende source
Flag this post
How to secure your data, connection, and wallet: Travel tips
howtogeek.comยท1d
๐Ÿ self hosting
Flag this post
Measuring Cybersecurity ROI Through the Lens of Tools Consolidation
guidepointsecurity.comยท3h
๐Ÿ”“opende source
Flag this post
Euromonitor's Monthly Roundup: November 2025
google.comยท1d
๐Ÿ self hosting
Flag this post
POLL: Regarding self-hosting vs use of external services what is your approach?
discuss.privacyguides.netยท20h
๐Ÿ self hosting
Flag this post
Celebrating Wikidataโ€™s 13th Birthday in Rwanda 2025
diff.wikimedia.orgยท3h
๐Ÿ”“opende source
Flag this post
Vodafone withdraws from public internet exchanges in Germany
ppc.landยท1d
๐Ÿ self hosting
Flag this post
Bluetooth Security Risks: Why Leaving It On Could Endanger Your Data
blogger.comยท1d
๐Ÿ self hosting
Flag this post
Equifax Assists Regulated Businesses with AML Compliance
prnewswire.comยท16h
๐Ÿ self hosting
Flag this post
Read more: Swiss cantons to equip police officers with bodycams
swissinfo.chยท1d
๐Ÿ”“opende source
Flag this post
Automated Multi-Parameter Cardiac MRI Analysis via Hyperdimensional Pattern Matching
dev.toยท7hยท
Discuss: DEV
๐Ÿ self hosting
Flag this post
What if your AI looked at an image, answered, then doubted itself?
github.comยท1dยท
Discuss: Hacker News
๐Ÿ self hosting
Flag this post
Workphone and worklaptop provided
reddit.comยท4hยท
Discuss: r/privacy
๐Ÿ self hosting
Flag this post
Keynote: Cloud Native Back to the Future: The Road Ahead - Jeremy Rickard & Alex Chircop
youtube.comยท9h
๐Ÿ”“opende source
Flag this post
Privacy fears drive VPN boom as Italy enforces mandatory age verification
techradar.comยท1d
๐Ÿ self hosting
Flag this post
Slice-Aware Spoofing Detection in 5G Networks Using Lightweight Machine Learning
arxiv.orgยท8h
๐Ÿ”“opende source
Flag this post
How clause-level constraints turn training choices into verifiable policies for generative systems
dev.toยท3dยท
Discuss: DEV
๐Ÿ”“opende source
Flag this post