cm0002
@cm0002@lemmy.world
This is a remote user, information on this page may be incomplete. View at Source ↗
- Submitted 9 hours ago to music@lemmy.sdf.org | 1 comment
- Submitted 17 hours ago to [deleted] | 0 comments
- Submitted 20 hours ago to music@lemmy.sdf.org | 0 comments
- Submitted 22 hours ago to technology@lemmy.zip | 1 comment
- ‘A million calls an hour’: Israel relying on Microsoft cloud for expansive surveillance of Palestinianswww.theguardian.com ↗Submitted 1 day ago to technology@lemmy.zip | 0 comments
- Submitted 1 day ago to cybersecurity@infosec.pub | 0 comments
- Submitted 1 day ago to technology@lemmy.zip | 0 comments
- Comment on Message scheduling is a wonderful thing 💫 2 days ago:
I mean I do type each one as I normally would to each person, just far ahead of time and then saved.
I find it akin to those “Don’t open til…” Letters
- Comment on Message scheduling is a wonderful thing 💫 2 days ago:
Well more like half automated messages, the content is typed as I normally would to that specific person, just ahead of time and then scheduled to deliver automatically on the day
- Submitted 2 days ago to memes@sopuli.xyz | 10 comments
- Submitted 2 days ago to music@lemmy.sdf.org | 0 comments
- Submitted 3 days ago to technology@lemmy.zip | 2 comments
- Submitted 3 days ago to technology@lemmy.zip | 2 comments
- Submitted 3 days ago to technology@lemmy.zip | 4 comments
- Submitted 3 days ago to technology@lemmy.zip | 1 comment
- Submitted 4 days ago to music@lemmy.sdf.org | 1 comment
- Submitted 4 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 4 days ago to technology@lemmy.zip | 0 comments
- Submitted 4 days ago to music@lemmy.sdf.org | 0 comments
- Submitted 4 days ago to technology@lemmy.zip | 11 comments
- Genetic rescue reduces harmful mutations in Florida panthers without erasing local ancestryphys.org ↗Submitted 4 days ago to [deleted] | 3 comments
- Submitted 5 days ago to music@lemmy.sdf.org | 0 comments
- Submitted 5 days ago to technology@lemmy.zip | 6 comments
- Internet exchange points are ignored, vulnerable, and absent from infrastructure protection planswww.theregister.com ↗Submitted 5 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 5 days ago to technology@lemmy.zip | 5 comments
- Submitted 5 days ago to cybersecurity@infosec.pub | 2 comments
- Submitted 5 days ago to technology@lemmy.zip | 0 comments
- Submitted 6 days ago to technology@lemmy.zip | 3 comments
- Submitted 6 days ago to technology@lemmy.zip | 4 comments
- Submitted 6 days ago to technology@lemmy.zip | 0 comments