US and UK warn of major e-visa data breach in Somalia
bbc.comยท2h
๐ self hosting
Flag this post
13 dizzying and dazzling images from 2025 Drone Photo Awards
popsci.comยท2h
๐ self hosting
Flag this post
When the law bends: What the narcotics boat debate misses
breakingdefense.comยท23h
๐opende source
Flag this post
Continuous profiling for native code: Understanding the what, why, and how
grafana.comยท1d
๐opende source
Flag this post
Not Even Going to Try to Engage with Leftist Spaces Anymore
nobo.bearblog.devยท59m
๐opende source
Flag this post
Don't Treat Intellectual Property as an Afterthought. It's the Key to Long-Term Success.
entrepreneur.comยท1d
๐opende source
Flag this post
GitHub - felt/tippecanoe: Build vector tilesets from large collections of GeoJSON features.
github.comยท2h
๐opende source
Flag this post
A functionally complete logic gate in a soft photoresponsive hydrogel
nature.comยท1d
๐opende source
Flag this post
IDScan.net Joins IAATI to Advance Identity Fraud Prevention in Vehicle Crime
einpresswire.comยท1d
๐ self hosting
Flag this post
Why IoT in Your Supply Chain Still Poses a Serious Cyber Risk
bitsight.comยท1d
๐opende source
Flag this post
Modelling data with relations
snell-pym.org.ukยท3d
๐ self hosting
Flag this post
ChatGPT Group Chats are here... but not for everyone (yet)
venturebeat.comยท23h
๐ self hosting
Flag this post
Letter: Europeโs courts are asking the right question of oil companies
ft.comยท1d
๐opende source
Flag this post
Berlin downplays risk from German Antifa group targeted by US
channelnewsasia.comยท23h
๐opende source
Flag this post
Will centrist EPP join forces with โrightwing extremistsโ?
euobserver.comยท2d
๐opende source
Flag this post
6 free quality-of-life open-source apps I install on every Windows PC and Mac
xda-developers.comยท1d
๐opende source
Flag this post
InteractiveAdvertisingBureau/openrtb2.x
github.comยท3d
๐opende source
Flag this post
Germany to buy โฌ150m of weapons for Ukraine through PURL, Pistorius says
euronews.comยท1d
๐opende source
Flag this post
How clause-level constraints turn training choices into verifiable policies for generative systems
๐opende source
Flag this post
Loading...Loading more...