technology
@technology@beehaw.org
This is a remote community, information on this page may be incomplete. View at Source ↗
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
- Submitted 1 month ago by solo@slrpnk.net | 0 comments
- Submitted 1 year ago by recursive_recursion@programming.dev | 3 comments
- Submitted 1 month ago by sabreW4K3@lazysoci.al | 11 comments
- Submitted 1 month ago by sabreW4K3@lazysoci.al | 20 comments
- [Gamers Nexus] Intel Fights Back | Arc Battlemage, Xe2 GPUs, & Changing Hyper-Threadingwww.youtube.com ↗Submitted 1 year ago by recursive_recursion@programming.dev | 1 comment
- Submitted 1 year ago by Lanky_Pomegranate530@midwest.social | 1 comment
- Gambling Is No Game: DNS Links Between Chinese Organized Crime and Sports Sponsorshipsblogs.infoblox.com ↗Submitted 11 months ago by 0x815@feddit.org | 0 comments
- Surveilling Alone: In the U.S., home security cameras are booming in an era of rising crime and declining trust. But they’re driving neighbors further apart.www.thenewatlantis.com ↗Submitted 1 year ago by tardigrada@beehaw.org | 6 comments
- Submitted 1 year ago by tardigrada@beehaw.org | 1 comment
- Submitted 1 year ago by Kissaki@beehaw.org | 0 comments
- Google: "State-backed attackers and commercial surveillance vendors repeatedly use the same exploits"blog.google ↗Submitted 9 months ago by 0x815@feddit.org | 0 comments
- Submitted 1 year ago by admin@beehaw.org | 56 comments
- TIDRONE, a threat actor linked to Chinese-speaking groups, targets military-related industry chains in Taiwanweb.archive.orghttps ↗Submitted 9 months ago by 0x815@feddit.org | 1 comment
- Submitted 8 months ago by loopy@lemm.ee | 11 comments
- Operation Overload: how pro-Russian actors flood newsrooms -mostly in Ukraine, France and Germany- with fake content and seek to divert their effortscheckfirst.network ↗Submitted 1 year ago by 0x815@feddit.de | 0 comments
- Submitted 1 year ago by corbin@infosec.pub | 5 comments
- Submitted 11 months ago by chobeat@lemmy.ml | 0 comments
- Submitted 1 year ago by sexy_peach@beehaw.org | 6 comments
- Submitted 1 year ago by 0x815@feddit.de | 0 comments
- Submitted 10 months ago by tardigrada@beehaw.org | 0 comments
- Submitted 11 months ago by theangriestbird@beehaw.org | 10 comments
- China ponders creating a national 'cyberspace ID' - because clearly it's better for Beijing to know who you are than for every ISP and social service to keep its own recordswww.theregister.com ↗Submitted 10 months ago by tardigrada@beehaw.org | 0 comments
- Submitted 1 month ago by sabreW4K3@lazysoci.al | 1 comment
- Submitted 7 months ago by rosschie@lemdro.id | 4 comments
- Submitted 1 month ago by schnurrito@discuss.tchncs.de | 25 comments
- Submitted 1 year ago by mozz@mbin.grits.dev | 0 comments
- Submitted 9 months ago by SpectralPineapple@beehaw.org | 1 comment
- Submitted 1 month ago by sabreW4K3@lazysoci.al | 1 comment
- Submitted 1 month ago by sabreW4K3@lazysoci.al | 6 comments
- Submitted 1 year ago by recursive_recursion@programming.dev | 3 comments