Who speaks for the dead? Rethinking consent in ancient DNA research
theconversation.comยท15h
๐ชEuropean data sovereignty
Flag this post
Deleting Your Suspension is a Hilariously Dumb Thing to Do
autoblog.comยท15h
๐ self hosting
Flag this post
Top 5 network security tools to protect your business
proton.meยท16h
๐ชEuropean data sovereignty
Flag this post
Planning for Flow Success: Building Automation That Scales
admin.salesforce.comยท1d
๐ self hosting
Flag this post
Building a Gmail Inbox Management Agent in n8n
kdnuggets.comยท12h
๐ชEuropean data sovereignty
Flag this post
AI Wealth Managers and Smart Contracts = Dead People Controlling Money Forever
๐ชEuropean data sovereignty
Flag this post
Show HN: Privacy Experiment โ Rewriting HTTPS, TLS, and TCP/IP Packet Headers
๐ self hosting
Flag this post
Dynatrace: Solid Execution, Limited Margin Of Safety
seekingalpha.comยท1d
๐ self hosting
Flag this post
Question the Requirements
lesswrong.comยท1d
๐ self hosting
Flag this post
Cloud App Journey: Ep. 5 โ Cloud Security: Protecting APIs, Credentials, and Data on Azure
๐ self hosting
Flag this post
EU gig-workers still exploited, despite landmark laws
euobserver.comยท18h
๐ชEuropean data sovereignty
Flag this post
Understanding UX Design: Creating Experiences That Matter
๐ชEuropean data sovereignty
Flag this post
How clause-level constraints turn training choices into verifiable policies for generative systems
๐ชEuropean data sovereignty
Flag this post
Security Researchers at Proton Warn of Massive Credential Exposure
blogger.comยท20h
๐ชEuropean data sovereignty
Flag this post
Mastering SQL โ From Zero to Hero
๐ self hosting
Flag this post
Imperative to Relational
๐ชEuropean data sovereignty
Flag this post
Epstein-Docs.github.io
๐opende source
Flag this post
Loading...Loading more...