Latest bookmarks (page 61 of 96)
27 Jan
openrss.org
"Now that Bluesky's got its own RSS feeds, here's what you should know"
Public-only Currently plain text only. Discoverable, not visible on profile page. https://bsky.app/profile/long-did-identifier/rss
Public-only Currently plain text only. Discoverable, not visible on profile page. https://bsky.app/profile/long-did-identifier/rss
26 Jan
paul.kinlan.me
"I got a minimal version of it working. You can discover my page, follow my account, and it will post updates when my blog deploys a new page."
26 Jan
s3lph.me
"I wanted to figure out, which parts of the ActivityPub protocol can be implemented in a purely static website, and how well other servers in the Fediverse interact with it. My goal was to attach this blog to the Fediverse. "
26 Jan
socialhub.activitypub.rocks
Discussion on whether, how to, and what the limitations are of trying to build a static ActivityPub server.
It's suggested that it's easier to use an RSS-to-AP bridge than try to force AP into a design that it's not built for. Links to several related articles
It's suggested that it's easier to use an RSS-to-AP bridge than try to force AP into a design that it's not built for. Links to several related articles
26 Jan
microjs.com
Tiny JavaScript libraries to can use with otherwise-vanilla JS instead of a giant framework.
26 Jan
www.nature.com
"A tragic scandal at the UK Post Office highlights the need for legal change, especially as organizations embrace artificial intelligence to enhance decision-making."
26 Jan
www.schneier.com
"Right now, this sort of interaction is a novelty. But as chatbots become a ubiquitous element of modern life and permeate many of our human-computer interactions, they have the potential to subtly reshape how we think about both computers and our fellow human beings."
26 Jan
www.smithsonianmag.com
Smithsonian article about software engineer Margret Hamilton and her career at NASA.
26 Jan
www.highseverity.com
Storing malicious Javascript at the window level (ex. window.name), so if the victim goes to the target site, even a short vulnerable field can do something like eval(name).
I wonder if this sort of thing still works.
I wonder if this sort of thing still works.