• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Why does the name ‘David Mayer’ crash ChatGPT? Digital privacy requests may be at fault
https://techcrunch.com/2024/12/02/why-does-the-name-david-mayer-crash-chatgpt-digital-privacy-requests-may-be-at-fault/

Users of the conversational AI platform ChatGPT discovered an interesting phenomenon over the weekend: the popular chatbot refuses to answer questions if

 
ai
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Meteor burns up over Earth in amazing footage from space station
https://www.youtube.com/watch?v=96owQKfp2Bw

NASA astronaut Matthew Dominick, currently aboard the International Space Station, captured footage of a meteor burning up in Earth atmosphere on Sept. 2, 20...

 
night space
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
60TB hard drives arriving in 2028 according to industry roadmap — HDD capacity forecast to double in
https://www.tomshardware.com/pc-components/storage/60tb-hard-drives-arriving-in-2028-according-to-industry-roadmap-hdd-capacity-forecast-to-double-in-four-years

IEEE predicts a steady rise in HDD capacity in the next 13 years, and the number of drives sold is also set to increase.

 
hardware storage
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Four Naked Women Who Are Not My Wife And One Naked Woman Who Is | VICE
http://www.vice.com/read/four-women-109-v15n7
 
nekkid
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Introduction to Circos Features and Uses // CIRCOS Circular Genome Data Vi
https://circos.ca/
 
data visualisation
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
I tried Google's secret open source app and glimpsed the power of offline AI
https://www.androidauthority.com/google-ai-edge-gallery-3565904/

Available only on GitHub, Google AI Edge Gallery is the company's new AI app. But what does it do, and how does it compare to Gemini?

 
ai google llm mobile
Added 4 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Best practices for organizations and teams using GitHub Enterprise Cloud -
https://github.blog/2023-08-02-best-practices-for-organizations-and-teams-using-github-enterprise-cloud/

Learn how you can structure your enterprise to get the most value out of GitHub and provide the best experience for your developers!

 
best practises enterprise github security
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
New - Registry of Open Data on AWS (RODA)
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/

Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]

 
amazon aws data open data
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The Open Book Project: open-hardware e-ink eBook reader
https://news.ycombinator.com/item?id=28611205
 
hardware open source reading
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The UNIX-HATERS Handbook
https://simson.net/ref/ugh.pdf
 
documentation funny unix
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
OWASP Threat Dragon
https://owasp.org/www-project-threat-dragon/

OWASP Threat Dragon is a threat modeling tool; great for both developers and defenders alike. Use on your desktop or as a web application.

 
cyber security threat
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_permission&linkId=54227051
https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_permission&linkId=54227051

Today, AWS released a new IAM feature that makes it easier for you to delegate permissions management to trusted employees. As your organization grows, you might want to allow trusted employees to configure and manage IAM permissions to help your organization scale permission management and move workloads to AWS faster. For example, you might want […]

 
aws permissions security
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog
https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog
 
cyber security ssh
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The eagle has landed. Fastway got it here from Wollongong in one piece
https://www.reddit.com/r/brisbane/comments/k011ox/the_eagle_has_landed_fastway_got_it_here_from/
 
brisbane image poster
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
4 Open Source Tools to Add to Your Security Arsenal
https://www.darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal/a/d-id/1340487
 
open source security tools
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The Epochalypse Project | Epochalypse Project
https://epochalypse-project.org/

Raising awareness about the 2038 bug in all its manifestations and trying to fix things while there’s still time.

 
time
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://firehydrant.io/
https://firehydrant.io/

FireHydrant helps you plan, respond, and learn from incidents with AI-enriched automation, retrospectives, and on-call tools—boosting reliability & reducing MTTR.

 
incident management
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/

Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.

 
containers docker networking
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Spotify’s Vulnerability Management Platform - Spotify Engineering : Spotify
https://engineering.atspotify.com/2022/11/spotifys-vulnerability-management-platform/

We started developing our vulnerability management platform (VMP) at Spotify in Q2, 2020, and now that we’ve implemented it and use the system in our day-to-day work, we wanted to take a moment to share our journey to help reduce security risks in an efficient and scalable manner.

 
management security vulnerability
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://isc.sans.edu/api/threatcategory/research
https://isc.sans.edu/api/threatcategory/research
 
sans security threat
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Canonical announces 12 year Kubernetes LTS
https://canonical.com/blog/12-year-lts-for-kubernetes
  Canonical unveils 12-Year Kubernetes LTS, enhancing enterprise software infrastructure security and simplifying operations
 
k8s open source
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How to mitigate OWASP vulnerabilities while staying in the flow | The GitHu
https://github.blog/2022-11-04-how-to-mitigate-owasp-vulnerabilities-while-staying-in-the-flow/

Explore how GitHub Advanced Security can help address several of the OWASP Top 10 vulnerabilities

 
cicd git github security
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How a programmer got Doom to run on a space satellite and what happened next | ZDNET
https://www.zdnet.com/article/how-a-programmer-got-doom-to-run-on-a-space-satellite-and-what-happened-next/
 
doom open source space
Added 6 days ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Install EKS-D with MicroK8s - General Discussions / microk8s - Discuss Kube
https://discuss.kubernetes.io/t/install-eks-d-with-microk8s/21479

What is EKS-D Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (Amazon EKS). It provides latest upstream updates as well as extended security patching support…

 
authentication aws k8s
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 40
  • 41
  • 42
  • ...
  • 48
  • 49
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks