10,000 Matching Annotations
  1. Dec 2023
    1. Welcome to ODD SDK!

      ODD SDK is Fission's true local-first, edge computing stack.

      ODD SDK empowers you to build fully distributed web applications with auth and storage without needing a complex backend. To learn more, check out the ODD SDK docs.

    1. Introduction | ODD SDK Docs

      The ODD SDK empowers developers to build fully distributed web applications without needing a complex back-end.

  2. Nov 2023
    1. IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      [docdrop](IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.) 15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    2. IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    3. 15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    4. This talk presents UCAN Invocations and the Interplanetary VM (IPVM).

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    5. Verifiable computation opens the door to

      Verifiable computation opens the door to - content-addressed function invocations, - results, and - workflows.

      >= Based on such protocols we could add human beings, (universal) users as - first class autonomous verifiable Actors (UCAN zero knowledge proofs) - with native intel(igen|e|lec|)t - forming their own(ed) InterPersonal multiplayer collaborative networks of trust, as the third element connecting

      universal virtual hyperdocuments for long term evergreen - info- structures - hypermedia

      universal machines and computer agents responsible for

      universal machines as - communication - infra- structures

      <<

      This radically lowers the complexity of historical architectures (e.g. the - LAMP stack), - networked, and distributed systems.

      decouple the articulation of effective intent intentional software from implementation architectural concerns and make them

      >= composed of fully exchangeable mechanisms for specific needs constellations and workloads This is possible since with IP* protocols now possible to envisage a new cosmology of computing in the cryptocosm

      <<

      Not only is this - easier to reason about,

      it also (paradoxically) enables - superlinear scaling: - the more it gets used, - the more efficient it becomes!

    6. The advent of TCP/IP and the web produced

      The advent of TCP/IP and the web produced - an explosion of innovation by

      radically lowering the barrier to entry to - connect over the network.

      Thanks to new technical and social innovations, we now have - the building blocks for the next generation of

      open services: - location-free - verifiable data and - computation.

    1. IPFS Connect Istanbul 2023: Event based Mutability on IPFS

      10 views 22 Nov 2023 Understand the core principles and primitives that enable you to build mutable applications on top of IPFS. Get a sneak peak of Ceramic API, which makes building really easy.

      Description

    1. Recording (last talk of the day): https://www.youtube.com/live/bsIPIb5ega8?feature=share

      Title: Lessons learnt & the future of DAOs Summary (long): RnDAO started 18 months ago with the intention of researching and practicing DAOing by bridging learnings across Web3, Academia, and previous experiments in progressive organisation. This talk will present a summary of our mistakes, learnings, and visions for the future of DAOs and organisations at large.

    1. ​We must start with end-programmer programming

      ​We must start with end-programmer programming - to achieve end-user programming,

      - where users can
      
      • spin up personalized apps
        • without knowing how to code.

      With end-programmer programming, software engineers can build - folk applications, integrations, and mini-apps - to customize - their experience interacting with third-party software.

    2. ​We must start with end-programmer programming to achieve end-user programming, where users can spin up personalized apps without knowing how to code. With end-programmer programming, software engineers can build folk applications, integrations, and mini-apps to customize their experience interacting with third-party software.

      Description

      local ipfs

    3. EP04: End-Programmer Programming with Steve Krouse of Val Town - The Causal Islands Podcast

      Description EP04: End-Programmer Programming with Steve Krouse of Val Town - The Causal Islands Podcast local ipfs

    1. GUILE (GNU's Ubiquitous Intelligent Language for Extension)

      Description

      is a - library implementation of the Scheme programming language, written in C. - GUILE provides a machine-independent execution platform that can be linked in as a library during the building of extensible programs.

      Install the guile package - if you'd like to add - extensibility to programs that you are developing.

    2. GUILE (GNU's Ubiquitous Intelligent Language for Extension) is a

      library implementation of the Scheme programming language, written in C. GUILE provides a machine-independent execution platform that can be linked in as a library during the building of extensible programs. Install the guile package if you'd like to add extensibility to programs that you are developing.

    1. The FAIR principles

      The FAIR data principles are a set of guiding principles to make data Findable, Accessible, Interoperable and Reusable, so that data can be found, understood and reused by others.

  3. www.oxfordreference.com www.oxfordreference.com
    1. meaning snarf

      cryptpad link

      for - concept : FAIR snarf

      copy parts of a web page for personal use and share it in you own personal networks of collaborateors for the purpose of learning and discussion

      This is also meant to be not only within the limits of FAIR use but more importantly to make content of personal interest that is lokced up in silos, requiring sign up and sign in so that it is un FAIR

      liberating such content by snarfing and personal archiving for the purpose of interpersonal sharing

      wouod render the content FAIR

      • Findable
      • Accessibale
      • Interoperable
      • Reusable

      at Dunbar Scale thorugh personal sharing

  4. k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084 k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084
    1. Introducing Content+AI

      People + Context + Content > Content + AI

      where Context is Situated Alive Evergreen with full recapitulable history of co-laborations and coevolution

    1. Rather than users and applications needing
      • Rather than users and applications

      needing to include - the entirety of the data in a payload,

      • they can

      just reference - the CID of the data itself.

    2. without having to worry about

      without having to worry about whether - the data they care about is controlled by someone else.

      autonomous means of named evergreen info-communications-infra structures connecting people, that are owned and controlled by the people for the people

    3. weaving the Open Mutual Indy Learning Commons: The IndyWeb as

      augmented externalization of the co-evolution of human interintellect

      meaning/intent-fully linked info structures organized by self-explicating personal first interlayed meta-structures

    4. The Data Layer refers to

      The Data Layer refers to - data itself, - independent of where it is physically stored.

      It is fluid and flexible, where any entity on the web - - end-users, - applications, - infrastructure, - organizations,

      and more - can interact with it

    5. enter payment information
      • All users

      must enter payment information, - even when signing up for the Starter tier.

      We recognize that this might add inconvenience for you, but - this is a necessary measure to prevent users from uploading malicious content.

    6. we realized that

      we realized that - there was only so far we could fulfill their needs

      before needing to - re-architect the entire API and clients.

    1. viable metaphor for

      viable metaphor for blockchain, - we’d find a beautiful representation in the ancient Buddhist metaphor of - Indra’s Net.

    2. In a blockchain network,

      In a blockchain network, - all the information of a full network - is available to each “node” in the network - when needed.

    3. blockchain, a novel technology

      blockchain allows for a kind of - radical, system-wide transparency

      set up in a such a way that - trust emerges organically.

      // - try to build systems built from trust from trust

    4. Why did we ever need a massive central authority

      Why did we ever need a massive central authority just to trade between ourselves in the first place?

      what happens when you want to trade with someone you’ve never met before? How can you trust that you won’t be taken advantage of?

    1. Lao-cï TAO TÖ KING Tőkei Ferenc fordítása Forrás: Kínai filozófia, Ókor, Második kötet, Akadémiai Kiadó, Budapest, 1964, 17-54. oldal A kínai szavak magyar tudományos átírásban szerepelnek.

      TAO TE KING

  5. k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084 k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084
    1. We reserve the right to terminate the Services

      We reserve the right to terminate the Services at our sole discretion or to transfer operation of the Services to a third party or smart contract. Prior to termination or transfer, - we will provide 90 days’ notice to users via email

      to allow users enough time to make arrangements if any (e.g. remote pinning to their own IPFS node, remote pinning to another service, or preparing to manage the renewal of their Filecoin deals on their own).

    1. QmRw4WBZZBQAuMsGgascJBT74HeUruqUu1BGE3J3U4QCBg

      http://bafybeibvmo3hj53qznfqyobcmysnsmc6iyb6zzvwterg3gtrykfknyr2t4.ipfs.localhost:48084/

    Annotators

    URL

    Annotators

    URL

    1. Dialog is a work-in-progress

      Dialog is a work-in-progress - strongly eventually consistent data store

      that combines - content-addressable storage, - the rich distributed query semantics of Datalog, and - the flexible security model of cryptrees.

      It builds off of existing ideas from the WebNative SDK - to empower developers - to build new types of local-first applications.

    1. Every actor is attached to exactly one mailbox

      In a Human Actor Model every individual will have many mailboxes corresponding to the connections they establish with others

    1. GraphSync is a protocol for synchronizing IPLD graphs among peers. It allows a host to make a single request to a remote peer for all of the results of traversing an IPLD selector on the remote peer's local IPLD graph.

      GraphSync

    1. József Attila: Nem én kiáltok | Kárpátalja karpataljalap.net › 2013 › 06 › 21 › jozsef-attila-nem-en-kialtok 19 June 2013 - A „Légy egy fűszálon a pici él, S nagyobb leszel a világ tengelyénél” sorpár jelentése abban áll, hogy az embert nem az általa vállalt szerep nagysága, hanem az elvállalt szerep maradéktalan betöltése minősíti. Tehát a legegyszerűbb-legkisebb dolog magas színvonalon ...

      to - ipfs

    1. In-kernel web server

      An in-kernel web server is an unlimited HTTP server that runs in kernel space or equivalent. It is also known as "accelerator". Performance: the path taken by data from a source device (i.e. a disk) to a destination device (i.e. a NIC). Proper asynchronous zero-copy interfaces would make this

    1. Unicode Block “Dingbats”

      Character List U+2700

      ✀ Black Safety Scissors

      U+2701

      ✁ Upper Blade Scissors

      U+2702

      ✂ Black Scissors

      U+2703

      ✃ Lower Blade Scissors

      U+2704

      ✄ White Scissors

      U+2705

      ✅ White Heavy Check Mark

      U+2706

      ✆ Telephone Location Sign

      U+2707

      ✇ Tape Drive

      U+2708

      ✈ Airplane

      U+2709

      ✉ Envelope

      U+270A

      ✊ Raised Fist

      U+270B

      ✋ Raised Hand

      U+270C

      ✌ Victory Hand

      U+270D

      ✍ Writing Hand

      U+270E

      ✎ Lower Right Pencil

      U+270F

      ✏ Pencil

      U+2710

      ✐ Upper Right Pencil

      U+2711

      ✑ White Nib

      U+2712

      ✒ Black Nib

      U+2713

      ✓ Check Mark

      U+2714

      ✔ Heavy Check Mark

      U+2715

      ✕ Multiplication X

      U+2716

      ✖ Heavy Multiplication X

      U+2717

      ✗ Ballot X

      U+2718

      ✘ Heavy Ballot X

      U+2719

      ✙ Outlined Greek Cross

      U+271A

      ✚ Heavy Greek Cross

      U+271B

      ✛ Open Centre Cross

      U+271C

      ✜ Heavy Open Centre Cross

      U+271D

      ✝ Latin Cross

      U+271E

      ✞ Shadowed White Latin Cross

      U+271F

      ✟ Outlined Latin Cross

      U+2720

      ✠ Maltese Cross

      U+2721

      ✡ Star of David

      U+2722

      ✢ Four Teardrop-Spoked Asterisk

      U+2723

      ✣ Four Balloon-Spoked Asterisk

      U+2724

      ✤ Heavy Four Balloon-Spoked Asterisk

      U+2725

      ✥ Four Club-Spoked Asterisk

      U+2726

      ✦ Black Four Pointed Star

      U+2727

      ✧ White Four Pointed Star

      U+2728

      ✨ Sparkles

      U+2729

      ✩ Stress Outlined White Star

      U+272A

      ✪ Circled White Star

      U+272B

      ✫ Open Centre Black Star

      U+272C

      ✬ Black Centre White Star

      U+272D

      ✭ Outlined Black Star

      U+272E

      ✮ Heavy Outlined Black Star

      U+272F

      ✯ Pinwheel Star

      U+2730

      ✰ Shadowed White Star

      U+2731

      ✱ Heavy Asterisk

      U+2732

      ✲ Open Centre Asterisk

      U+2733

      ✳ Eight Spoked Asterisk

      U+2734

      ✴ Eight Pointed Black Star

      U+2735

      ✵ Eight Pointed Pinwheel Star

      U+2736

      ✶ Six Pointed Black Star

      U+2737

      ✷ Eight Pointed Rectilinear Black Star

      U+2738

      ✸ Heavy Eight Pointed Rectilinear Black Star

      U+2739

      ✹ Twelve Pointed Black Star

      U+273A

      ✺ Sixteen Pointed Asterisk

      U+273B

      ✻ Teardrop-Spoked Asterisk

      U+273C

      ✼ Open Centre Teardrop-Spoked Asterisk

      U+273D

      ✽ Heavy Teardrop-Spoked Asterisk

      U+273E

      ✾ Six Petalled Black and White Florette

      U+273F

      ✿ Black Florette

      U+2740

      ❀ White Florette

      U+2741

      ❁ Eight Petalled Outlined Black Florette

      U+2742

      ❂ Circled Open Centre Eight Pointed Star

      U+2743

      ❃ Heavy Teardrop-Spoked Pinwheel Asterisk

      U+2744

      ❄ Snowflake

      U+2745

      ❅ Tight Trifoliate Snowflake

      U+2746

      ❆ Heavy Chevron Snowflake

      U+2747

      ❇ Sparkle

      U+2748

      ❈ Heavy Sparkle

      U+2749

      ❉ Balloon-Spoked Asterisk

      U+274A

      ❊ Eight Teardrop-Spoked Propeller Asterisk

      U+274B

      ❋ Heavy Eight Teardrop-Spoked Propeller Asterisk

      U+274C

      ❌ Cross Mark

      U+274D

      ❍ Shadowed White Circle

      U+274E

      ❎ Negative Squared Cross Mark

      U+274F

      ❏ Lower Right Drop-Shadowed White Square

      U+2750

      ❐ Upper Right Drop-Shadowed White Square

      U+2751

      ❑ Lower Right Shadowed White Square

      U+2752

      ❒ Upper Right Shadowed White Square

      U+2753

      ❓ Black Question Mark Ornament

      U+2754

      ❔ White Question Mark Ornament

      U+2755

      ❕ White Exclamation Mark Ornament

      U+2756

      ❖ Black Diamond Minus White X

      U+2757

      ❗ Heavy Exclamation Mark Symbol

      U+2758

      ❘ Light Vertical Bar

      U+2759

      ❙ Medium Vertical Bar

      U+275A

      ❚ Heavy Vertical Bar

      U+275B

      ❛ Heavy Single Turned Comma Quotation Mark Ornament

      U+275C

      ❜ Heavy Single Comma Quotation Mark Ornament

      U+275D

      ❝ Heavy Double Turned Comma Quotation Mark Ornament

      U+275E

      ❞ Heavy Double Comma Quotation Mark Ornament

      U+275F

      ❟ Heavy Low Single Comma Quotation Mark Ornament

      U+2760

      ❠ Heavy Low Double Comma Quotation Mark Ornament

      U+2761

      ❡ Curved Stem Paragraph Sign Ornament

      U+2762

      ❢ Heavy Exclamation Mark Ornament

      U+2763

      ❣ Heavy Heart Exclamation Mark Ornament

      U+2764

      ❤ Heavy Black Heart

      U+2765

      ❥ Rotated Heavy Black Heart Bullet

      U+2766

      ❦ Floral Heart

      U+2767

      ❧ Rotated Floral Heart Bullet

      U+2768

      ❨ Medium Left Parenthesis Ornament

      U+2769

      ❩ Medium Right Parenthesis Ornament

      U+276A

      ❪ Medium Flattened Left Parenthesis Ornament

      U+276B

      ❫ Medium Flattened Right Parenthesis Ornament

      U+276C

      ❬ Medium Left-Pointing Angle Bracket Ornament

      U+276D

      ❭ Medium Right-Pointing Angle Bracket Ornament

      U+276E

      ❮ Heavy Left-Pointing Angle Quotation Mark Ornament

      U+276F

      ❯ Heavy Right-Pointing Angle Quotation Mark Ornament

      U+2770

      ❰ Heavy Left-Pointing Angle Bracket Ornament

      U+2771

      ❱ Heavy Right-Pointing Angle Bracket Ornament

      U+2772

      ❲ Light Left Tortoise Shell Bracket Ornament

      U+2773

      ❳ Light Right Tortoise Shell Bracket Ornament

      U+2774

      ❴ Medium Left Curly Bracket Ornament

      U+2775

      ❵ Medium Right Curly Bracket Ornament

      U+2776

      ❶ Dingbat Negative Circled Digit One

      U+2777

      ❷ Dingbat Negative Circled Digit Two

      U+2778

      ❸ Dingbat Negative Circled Digit Three

      U+2779

      ❹ Dingbat Negative Circled Digit Four

      U+277A

      ❺ Dingbat Negative Circled Digit Five

      U+277B

      ❻ Dingbat Negative Circled Digit Six

      U+277C

      ❼ Dingbat Negative Circled Digit Seven

      U+277D

      ❽ Dingbat Negative Circled Digit Eight

      U+277E

      ❾ Dingbat Negative Circled Digit Nine

      U+277F

      ❿ Dingbat Negative Circled Number Ten

      U+2780

      ➀ Dingbat Circled Sans-Serif Digit One

      U+2781

      ➁ Dingbat Circled Sans-Serif Digit Two

      U+2782

      ➂ Dingbat Circled Sans-Serif Digit Three

      U+2783

      ➃ Dingbat Circled Sans-Serif Digit Four

      U+2784

      ➄ Dingbat Circled Sans-Serif Digit Five

      U+2785

      ➅ Dingbat Circled Sans-Serif Digit Six

      U+2786

      ➆ Dingbat Circled Sans-Serif Digit Seven

      U+2787

      ➇ Dingbat Circled Sans-Serif Digit Eight

      U+2788

      ➈ Dingbat Circled Sans-Serif Digit Nine

      U+2789

      ➉ Dingbat Circled Sans-Serif Number Ten

      U+278A

      ➊ Dingbat Negative Circled Sans-Serif Digit One

      U+278B

      ➋ Dingbat Negative Circled Sans-Serif Digit Two

      U+278C

      ➌ Dingbat Negative Circled Sans-Serif Digit Three

      U+278D

      ➍ Dingbat Negative Circled Sans-Serif Digit Four

      U+278E

      ➎ Dingbat Negative Circled Sans-Serif Digit Five

      U+278F

      ➏ Dingbat Negative Circled Sans-Serif Digit Six

      U+2790

      ➐ Dingbat Negative Circled Sans-Serif Digit Seven

      U+2791

      ➑ Dingbat Negative Circled Sans-Serif Digit Eight

      U+2792

      ➒ Dingbat Negative Circled Sans-Serif Digit Nine

      U+2793

      ➓ Dingbat Negative Circled Sans-Serif Number Ten

      U+2794

      ➔ Heavy Wide-Headed Rightwards Arrow

      U+2795

      ➕ Heavy Plus Sign

      U+2796

      ➖ Heavy Minus Sign

      U+2797

      ➗ Heavy Division Sign

      U+2798

      ➘ Heavy South East Arrow

      U+2799

      ➙ Heavy Rightwards Arrow

      U+279A

      ➚ Heavy North East Arrow

      U+279B

      ➛ Drafting Point Rightwards Arrow

      U+279C

      ➜ Heavy Round-Tipped Rightwards Arrow

      U+279D

      ➝ Triangle-Headed Rightwards Arrow

      U+279E

      ➞ Heavy Triangle-Headed Rightwards Arrow

      U+279F

      ➟ Dashed Triangle-Headed Rightwards Arrow

      U+27A0

      ➠ Heavy Dashed Triangle-Headed Rightwards Arrow

      U+27A1

      ➡ Black Rightwards Arrow

      U+27A2

      ➢ Three-D Top-Lighted Rightwards Arrowhead

      U+27A3

      ➣ Three-D Bottom-Lighted Rightwards Arrowhead

      U+27A4

      ➤ Black Rightwards Arrowhead

      U+27A5

      ➥ Heavy Black Curved Downwards and Rightwards Arrow

      U+27A6

      ➦ Heavy Black Curved Upwards and Rightwards Arrow

      U+27A7

      ➧ Squat Black Rightwards Arrow

      U+27A8

      ➨ Heavy Concave-Pointed Black Rightwards Arrow

      U+27A9

      ➩ Right-Shaded White Rightwards Arrow

      U+27AA

      ➪ Left-Shaded White Rightwards Arrow

      U+27AB

      ➫ Back-Tilted Shadowed White Rightwards Arrow

      U+27AC

      ➬ Front-Tilted Shadowed White Rightwards Arrow

      U+27AD

      ➭ Heavy Lower Right-Shadowed White Rightwards Arrow

      U+27AE

      ➮ Heavy Upper Right-Shadowed White Rightwards Arrow

      U+27AF

      ➯ Notched Lower Right-Shadowed White Rightwards Arrow

      U+27B0

      ➰ Curly Loop

      U+27B1

      ➱ Notched Upper Right-Shadowed White Rightwards Arrow

      U+27B2

      ➲ Circled Heavy White Rightwards Arrow

      U+27B3

      ➳ White-Feathered Rightwards Arrow

      U+27B4

      ➴ Black-Feathered South East Arrow

      U+27B5

      ➵ Black-Feathered Rightwards Arrow

      U+27B6

      ➶ Black-Feathered North East Arrow

      U+27B7

      ➷ Heavy Black-Feathered South East Arrow

      U+27B8

      ➸ Heavy Black-Feathered Rightwards Arrow

      U+27B9

      ➹ Heavy Black-Feathered North East Arrow

      U+27BA

      ➺ Teardrop-Barbed Rightwards Arrow

      U+27BB

      ➻ Heavy Teardrop-Shanked Rightwards Arrow

      U+27BC

      ➼ Wedge-Tailed Rightwards Arrow

      U+27BD

      ➽ Heavy Wedge-Tailed Rightwards Arrow

      U+27BE

      ➾ Open-Outlined Rightwards Arrow

      U+27BF

      ➿ Double Curly Loop

    1. Enclosed Alphanumerics unicode subset (adsbygoogle = window.adsbygoogle || []).push({});

      Ⓞ Ⓟ Ⓠ Ⓡ Ⓢ Ⓣ Ⓤ Ⓥ Ⓦ Ⓧ Ⓨ Ⓩ ⓐ ⓑ ⓒ ⓓ ⓔ ⓕ ⓖ ⓗ ⓘ ⓙ ⓚ ⓛ ⓜ ⓝ ⓞ ⓟ ⓠ ⓡ ⓢ ⓣ ⓤ ⓥ ⓦ ⓧ ⓨ ⓩ ⓪ ⓫ ⓬ ⓭ ⓮ ⓯ ⓰ ⓱ ⓲ ⓳ ⓴ ⓵ ⓶ ⓷ ⓸ ⓹ ⓺ ⓻ ⓼ ⓽ ⓾ ⓿

    1. Enclosed Alphanumerics unicode subset (adsbygoogle = window.adsbygoogle || []).push({});

      ① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ⑪ ⑫ ⑬ ⑭ ⑮ ⑯ ⑰ ⑱ ⑲ ⑳ ⑴ ⑵ ⑶ ⑷ ⑸ ⑹ ⑺ ⑻ ⑼ ⑽ ⑾ ⑿ ⒀ ⒁ ⒂ ⒃ ⒄ ⒅ ⒆ ⒇ ⒈ ⒉ ⒊ ⒋ ⒌ ⒍ ⒎ ⒏ ⒐ ⒑ ⒒ ⒓ ⒔ ⒕ ⒖ ⒗ ⒘ ⒙ ⒚ ⒛ ⒜ ⒝ ⒞ ⒟ ⒠ ⒡ ⒢ ⒣ ⒤ ⒥ ⒦ ⒧ ⒨ ⒩ ⒪ ⒫ ⒬ ⒭ ⒮ ⒯ ⒰ ⒱ ⒲ ⒳ ⒴ ⒵ Ⓐ Ⓑ Ⓒ Ⓓ Ⓔ Ⓕ Ⓖ Ⓗ Ⓘ Ⓙ Ⓚ Ⓛ Ⓜ Ⓝ

    Annotators

    URL

    1. The RDF-based vocabulary OntoMermaid serves

      The RDF-based vocabulary OntoMermaid serves as a - bridge between the expressive power of OWL (Web Ontology Language) and - the visual clarity of Mermaid diagrams.

      This vocabulary enables - the representation of OWL ontologies - in a structured and visual manner

      using the - Mermaid diagram language.

      By doing so, it facilitates - the understanding and communication of complex ontological structures, - making them more accessible to a wider audience.

    1. token-gating

      token-gating. Web3 Brave Talk calls allow hosts to use NFTs and POAPs 1 to token-gate access, configure avatars, assign moderator permissions, and more. Web3 calling also expands utility for Brave’s browser-native Brave Wallet: Together, they create the first-ever fully integrated Web3 live event platform, combining browser, wallet, and video.

    1. Personal Digital AgentProtocol

      "Enabling a shift from proprietary platforms to personal agents"

      for - Flipping the Web - the Flipped Web - IndyWeb or rather IndyW3B

      powered by Web 3 protocols and ecosystems

    1. palantír (/pæˈlænˌtɪər/; pl. palantíri) is one of several indestructible crystal balls from J. R. R. Tolkien's epic-fantasy novel The Lord of the Rings.

    1. Path-resolving gateways, however, violate the same-origin policy (opens new window) that protects one website from improperly accessing session data of another website

      path resolving gateways - do not provide origin isolation

      key idea can be used to access disparate resources having same origin

      key for integrating web capabilities at scael

    1. linked data backbones

      linked data backbones for - information, - data models and - mappings

      that connect - people, - things, and - insights.

      Code and APIs optional.

    Annotators

    URL

    1. Other than in an April Fool’s announcement in 2016, no such acquisition has taken place.

      instead of that Microsofyt just bought

      LinkedIn, Github and NPM

      If you can beat them join them become partners

      Embrace Extend Extinguish

      The jury is out who will be extinguished in the end