Search results

From Wiki
  • ...tal doubles aka advertising profiles that these companies create for their users. The author also stumbles upon Prof. Shoshana Zuboff's book on surveillance More than half the users on social media don't know that their new feeds are algorithmically sorted
    32 KB (5,320 words) - 11:56, 8 April 2022
  • ...hat the server spends less electricity running my code, but also helps end users use their computers for a shorter duration.
    4 KB (650 words) - 09:12, 12 September 2022
  • '''ansible''' (science fiction) A hypothetical device that enables users to communicate instantaneously across great distances; that is, a faster-th
    3 KB (411 words) - 05:10, 14 March 2019
  • 4. Write documentation so that users can easily carry out the task on their own.
    1 KB (163 words) - 13:32, 6 June 2020
  • #Burn the FreedomBox image to a microSD card from an Android phone to help users with a smartphone as their only computer install FreedomBox. There's an app
    1 KB (191 words) - 09:34, 8 March 2019
  • Alice and Bob are two FreedomBox users. Alice lives in a country where the internet is heavily censored by the gov
    3 KB (458 words) - 03:17, 2 January 2020
  • *Prevent spam on a channel by allowing registered users only <br /> <code>/mode #channel-name +R</code>
    209 bytes (33 words) - 13:43, 4 March 2019
  • ...developers have to consider in the architecture of their applications, end-users can also take control by using their desktop and mobile applications togeth
    4 KB (659 words) - 15:16, 16 December 2019
  • ...pying the file will lead to momentary exposure of the private key to other users on the system. Use umask instead.
    2 KB (359 words) - 20:57, 5 December 2021
  • ...important. Rules are not important. People are important. That means your users, your team, your family, yourself. To quote Joshua Kerievsky’s Modern Agi
    9 KB (1,516 words) - 06:15, 14 March 2021
  • ...diverse. At the time of this writing, the SSB network has about 200 active users. ...Butt doesn't strictly need internet access, since it's a P2P protocol. Two users can connect their clients over Wi-Fi, ethernet, bluetooth, tor, cjdns etc.
    3 KB (567 words) - 04:53, 2 December 2021
  • Centralization of disempowered users into large walled gardens is a common business model for Big Tech companies ...y people to empower themselves. Since there is no incentive to lock-in all users into one walled garden, open protocols are used. Usually peer-to-peer proto
    7 KB (1,057 words) - 13:59, 8 February 2024