Data Privacy, European Regulation, Compliance, User Rights

Time to start de-Appling
heatherburns.techยท1h
๐Ÿ‡ชEuropean data sovereignty
Flag this post
FinTrust: A Comprehensive Benchmark of Trustworthiness Evaluation in FinanceDomain
paperium.netยท21hยท
Discuss: DEV
๐Ÿ‡ชEuropean data sovereignty
Flag this post
At the Root: An Anti-Racist Ethical Source License for Open Source Projects
attheroot.devยท1dยท
Discuss: Hacker News
๐Ÿ‡ชEuropean data sovereignty
Flag this post
This new API tool helps Gemini tap into your trusted data sources
androidcentral.comยท31m
๐Ÿ”“opende source
Flag this post
Looking to sell an escrow payment system I built
app.lockva.comยท5hยท
๐Ÿ self hosting
Flag this post
โš ๏ธWARNINGโš ๏ธ
threadreaderapp.comยท1d
๐Ÿ‡ชEuropean data sovereignty
Flag this post
CommonsDB Explorer goes live at GLAM Wiki
openfuture.euยท2h
๐Ÿ‡ชEuropean data sovereignty
Flag this post
From Zero to LLMOps Hero: Your 101 Guide to Running LLMs in Production
analyticsvidhya.comยท9h
๐Ÿ self hosting
Flag this post
I logged all the HTTP requests that hit my new web server
lenny.bearblog.devยท1d
๐Ÿ self hosting
Flag this post
Evolving Inter.link's Software Delivery: Lessons in Fast, Consistent, and Safe Deployments (denog17)
cdn.media.ccc.deยท29m
๐Ÿ”“opende source
Flag this post
A compact syntax for XProc?
so.nwalsh.comยท5h
๐Ÿ self hosting
Flag this post
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
dev.toยท19hยท
Discuss: DEV
๐Ÿ”“opende source
Flag this post
Why data sovereignty is essential to help businesses prepare for impending AI regulation
techradar.comยท3d
๐Ÿ‡ชEuropean data sovereignty
Flag this post
Condensation
lesswrong.comยท19h
๐Ÿ”“opende source
Flag this post
Detections Digest #20251110
detections-digest.rulecheck.ioยท2h
๐Ÿ‡ชEuropean data sovereignty
Flag this post
Software Provenance
blog.jsbarretto.comยท1hยท
Discuss: Hacker News
๐Ÿ”“opende source
Flag this post
ID verification laws are fueling the next wave of breaches
bleepingcomputer.comยท1d
๐Ÿ‡ชEuropean data sovereignty
Flag this post
Exploiting Cloud-Based Computing Solutions for Business Agility
tessfkfc680563.webbuzzfeed.comยท18h
๐Ÿ self hosting
Flag this post
Controlled Vocabularies
jessicatalisman.substack.comยท9hยท
Discuss: Substack
๐Ÿ‡ชEuropean data sovereignty
Flag this post