technology
Which posts fit here?
Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.
Post guidelines
[Opinion] prefix
Opinion (op-ed) articles must use [Opinion] prefix before the title.
Rules
1. English only
Title and associated content has to be in English.
2. Use original link
Post URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communication
All communication has to be respectful of differing opinions, viewpoints, and experiences.
4. Inclusivity
Everyone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacks
Any kind of personal attacks are expressly forbidden. If you can’t argue your position without attacking a person’s character, you already lost the argument.
6. Off-topic tangents
Stay on topic. Keep it relevant.
7. Instance rules may apply
If something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.
Companion communities
!globalnews@lemmy.zip
!interestingshare@lemmy.zip
Icon attribution | Banner attribution
If someone is interested in moderating this community, message @brikox@lemmy.zip.
- Submitted 8 months ago by BrikoX@lemmy.zip | 3 comments
- The US adds export restrictions to 80 entities, primarily targeting Chinese companies, including server maker Nettrix and customers of Nvidia, Intel, and AMD.www.bis.gov ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 6 months ago by Cat@ponder.cat | 1 comment
- Submitted 11 months ago by BrikoX@lemmy.zip | 2 comments
- Blocking mobile internet on smartphones improves sustained attention, mental health, and subjective well-being.academic.oup.com ↗Submitted 5 months ago by Cat@ponder.cat | 0 comments
- Hackers could access medical equipment and pose a threat to lives, Northeastern cybersecurity expert tells Congress.news.northeastern.edu ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by possiblylinux127@lemmy.zip | 12 comments
- Submitted 8 months ago by BrikoX@lemmy.zip | 1 comment
- Submitted 9 months ago by BrikoX@lemmy.zip | 0 comments
- Submitted 11 months ago by BrikoX@lemmy.zip | 5 comments
- Oh Look, It Was Trivial To Buy Troop And Intelligence Officer Location Data From Dodgy, Unregulated Data Brokerswww.techdirt.com ↗Submitted 8 months ago by PhilipTheBucket@ponder.cat | 0 comments
- Submitted 8 months ago by BrikoX@lemmy.zip | 0 comments
- Submitted 2 months ago by BrikoX@lemmy.zip | 0 comments
- Submitted 10 months ago by BrikoX@lemmy.zip | 7 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 11 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 1 comment
- Submitted 4 months ago by chobeat@lemmy.ml | 0 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 8 comments
- AI is being used in social services – but we must make sure it doesn’t traumatise clients.theconversation.com ↗Submitted 6 months ago by Cat@ponder.cat | 1 comment
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 20 comments
- Submitted 8 months ago by PhilipTheBucket@ponder.cat | 1 comment
- Submitted 4 months ago by BrikoX@lemmy.zip | 0 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 3 comments
- Submitted 3 months ago by BrikoX@lemmy.zip | 0 comments
- Submitted 1 year ago by BrikoX@lemmy.zip | 11 comments
- Submitted 3 months ago by PhilipTheBucket@ponder.cat | 1 comment
- Submitted 1 year ago by BrikoX@lemmy.zip | 10 comments
- Submitted 8 months ago by Joker@sh.itjust.works | 4 comments