"How is that even possible?" Affinity reveals how it’s able to go 100% free forever
creativebloq.comΒ·2h
🎨Creative Commons
Flag this post
How Small Teams Can Scale Global Content Without Hiring a Translation Agency
hackmd.ioΒ·2hΒ·
Discuss: DEV
πŸ‘₯Crowdsourcing
Flag this post
AI company training U.S. Air Force robots wins venture capital competition
washingtontimes.comΒ·14h
πŸš€Indie Hacking
Flag this post
Cyberattacks on UK water systems reveal rising risks to critical infrastructure
malwarebytes.comΒ·2h
πŸ“‘Community Networks
Flag this post
Nominate the 2026 Dynamic Duos
armoneyandpolitics.comΒ·16h
β™ΏUniversal Design
Flag this post
Cloud Gaming Has Finally Officially Arrived on the PlayStation Portal
lifehacker.comΒ·16h
πŸ’ΎLocal-first Software
Flag this post
original β†—
alearningaday.blogΒ·2d
🌈Recommendation Diversity
Flag this post
Lost and confused. Any Help?
reddit.comΒ·14hΒ·
πŸ€–Local LLMs
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.orgΒ·8hΒ·
Discuss: Hacker News
πŸ¦‹ATProto
Flag this post
Facebook allows private groups to convert to public with member protections
ppc.landΒ·2d
πŸ†”Self-sovereign Identity
Flag this post
A Jarvis for everyone: AI agents as new interfaces
blog.logrocket.comΒ·1d
πŸ’ΎLocal-first Software
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comΒ·3d
πŸ¦‹ATProto
Flag this post
I ditched Stirling PDF for this self-hosted PDF toolkit, and I don’t regret it
xda-developers.comΒ·14h
πŸ—‚οΈObsidian
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·3d
πŸ†”Self-sovereign Identity
Flag this post
Show HN: I'm making an Open-source Japanese learning App inspired by Monkeytype
github.comΒ·20hΒ·
πŸšͺUser Onboarding
Flag this post
The 40-year economic mistake that let Google conquer (and enshittify) the world
doctorow.medium.comΒ·30m
⏳Tech History
Flag this post
Bringing together the minds defining the age of intelligence
nordot.appΒ·1d
πŸ€–AI Ethics
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toΒ·2dΒ·
Discuss: DEV
πŸ†”Self-sovereign Identity
Flag this post
A unified physics-informed generative operator framework for general inverse problems
arxiv.orgΒ·8h
πŸ“ŠBayesian Inference
Flag this post