Using CRDTs and Sync as a Database
🛡️Privacy Engineering
Flag this post
Breaking Up With Edtech Is Hard to Do
edsurge.com·2d
✅compliance
Flag this post
10 things in life you should always keep private (if you want to maintain your dignity)
artfulparent.com·1d
🛡️Privacy Engineering
Flag this post
Kindly join the waitlist
🛠cybersecurity
Flag this post
Notes from "Tor: From the Dark Web to the Future of Privacy"
evanhahn.com·2d
🛡️Privacy Engineering
Flag this post
Three Kinds Of Ontological Foundations
lesswrong.com·9h
⚖️AI Governance
Flag this post
Risk resolution of airport surface based on hybrid Petri nets and inverse reinforcement learning
sciencedirect.com·1d
⚠️Risk Management
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.com·2d
🛠cybersecurity
Flag this post
A Secured Intent-Based Networking (sIBN) with Data-Driven Time-Aware Intrusion Detection
arxiv.org·4h
🔒MLSecOps
Flag this post
IAB Australia publishes data deletion framework explainer for adtech
🛡️Privacy Engineering
Flag this post
From DataWareHouses to BigData Systems: What and Why - Questions that nobody asks, but you should!
⚠️Risk Management
Flag this post
Beginner’s Guide to Conquering NanoCorp on HackTheBox
thecybersecguru.com·19h
🛠cybersecurity
Flag this post
REMI AuthBridge: Patrimonial Identity Demo with Auth0 Integration
🛡️Privacy Engineering
Flag this post
GiftFlow: Self-hosted gift management with reimbursement tracking
🛡️Privacy Engineering
Flag this post
Germany pushes for sweeping data protection simplification beyond EU proposal
ppc.land·1d
🛡️Privacy Engineering
Flag this post
Loading...Loading more...