Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- links-kw16
- e been co-opted by capitalist forces, turning the internet against democracy. ---- **[[https://www.frontier... nt. ---- **[[https://www.theverge.com/c/24070570/internet-cables-undersea-deep-repair-ships|The invisible seafaring industry that keeps the internet afloat]]**: This article explores the world of s... bal communication and commerce, ensuring that the internet continues to function even in the face of disaste
- links-kw10
- f "TMI" (Too Much Information) in relation to the internet and how it affects our consumption of information... rs to democratize censorship and filter their own internet traffic. It features IP/TCP reassembly, various p... ain are now redirected to peculiar pages from the internet. It is likely that AVM took down this domain as i... P protocol is a fundamental building block of the Internet that ensures reliable data transmission. It works
- links-kw11
- s within the same local network without requiring internet access. It uses Bluetooth and WiFi Direct for dis... ng lists. ---- **[[https://injuly.in/blog/darker-internet/index.html|The internet is slipping out of our reach]]**: The internet is becoming dominated by SEO-hacked content farms, leading
- links-kw21
- transmit HTTP request, packets routed across the internet to server, server response, content rendering, an... d=40474202|Google just updated its algorithm. The Internet will never be the same]]**: The article discusse... hould not be dependent on individuals' use of the internet, smartphones, or certain software. The article ar... y. Utiq's tracking method uses knowledge of which internet connection belongs to which user, allowing websit
- links-kw42
- //www.dw.com/en/how-tech-giants-are-hijacking-the-internet/a-67037639|How tech giants are hijacking the internet]]**: Martin Andree, a media researcher at the Univer... t US digital platforms have seized control of the internet using unethical tactics, manipulating both web tr... nstitutions, leading to a hostile takeover of the internet. He proposes liberating the internet by enforcing
- links-kw1
- m/posts/age-verification-is-incompatible-with-the-internet/|Age Verification is Incompatible with the Internet - Jonah Aragon]]**: An article discusses the recent mo... creasing risks of identity theft and compromising internet safety. The article suggests a possible solution ... d knowledge resources, becomes harder without the internet. Moreover, the digital world is often energy-inte
- links-kw4
- Top-Level Domain String for Private Use]]**: The Internet Assigned Numbers Authority (IANA) has proposed to... style. The piece also praises early browsers like Internet Explorer 4.0 for their unique features and rememb... racker.ietf.org/doc/html/draft-omar-ipv10-06.html|Internet Protocol version 10 (IPv10) Specification]]**: 17 years ago, a new version of the Internet Protocol was proposed as IPv10 to allow communica
- links-kw7
- mo 7. Users have suggested disconnecting from the internet to force the console to use the game disc instead... ning-Kruger effect, and has been amplified by the internet and social media age. The implications include sk... w.theregister.com/2024/02/13/dnssec_vulnerability_internet/|DNSSEC vulnerability puts big chunk of the internet at risk]]**: The KeyTrap vulnerability, discovered by
- links-kw14
- **[[https://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/|A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask]]**: Alejandro Cac... able future. The island has phone connections and internet services via satellite but lacks frequent transpo... ow police to prosecute individuals based on their internet activity or locations. While Google is a major re
- links-kw18
- **[[https://lunduke.locals.com/post/5556650/the-internet-archives-last-ditch-effort-to-save-itself|The Internet Archive's last-ditch effort to save itself]]**: Mic... ularity for allowing users to communicate without internet access. It became a powerful tool for revolutiona... ents and protests, as it could bypass centralized Internet Service Providers. The app relied on Bluetooth an
- links-kw5
- le instances but show how many are exposed to the internet. The actual number of internet-facing Confluence servers is around 4,000, with honeypots accounting for ove... original context, maintained by the International Internet Preservation Consortium (IIPC). It houses various... s like OpenAI, which are using publicly available internet materials to train their large language models. T
- links-kw13
- which contains images and text harvested from the internet. The content within these datasets is crucial for... TS) tasks using in-the-wild data from audiobooks, internet videos, and podcasts. To clone an unseen voice or... in various browsers, including Firefox, Edge, and Internet Explorer. The library supports different types of... remotely access servers in the early days of the internet, before it was replaced by SSH. Despite being dep
- links-kw15
- ---- **[[https://boehs.org/node/llms-destroying-internet|LLMs Are This Close To Destroying The Internet]]**: The article discusses the current state of the internet and its potential demise due to the dominance of ... deas, experiences, and creative works to keep the internet alive and vibrant. ---- **[[https://www.nature.c
- links-kw17
- during the 1990s and early 2000s when high-speed internet was not yet widely available. This allowed gamers... oy fast, lag-free gameplay without relying on the internet. LAN parties featured a wide range of games, from... ng with the widespread introduction of high-speed internet and online multiplayer gaming services. ---- **[... ir bank account during the booking process on the internet. Some social network users have expressed irritat
- links-kw30
- ama 2 on your own devices without the need for an internet connection. ---- **[[https://en.wikipedia.org/wi... tocols and Networks]]**: In "Assault on the Open Internet," the author warns Mastodon server owners to bloc... r time, especially with the widespread use of the internet. There could be a connection between technology u... attention span, as social media, smartphones, and internet usage require frequent switching between tasks, p