unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
JSON in Swift: What You Need to Know
Too Long; Didn't ReadThere are three different ways to work with JSON (JavaScript Object Notation) i...
2024-5-8 04:33:47 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
swiftyjson
readthere
notation
Why 1-Bit Transformers Will Change the World
ReadWriteNotificationssee moreWhy 1-Bit Transformers Will Change the World by@thomascherickal New S...
2024-5-8 02:23:38 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
cherickal
analysis
Post-Apocalyptic Survival Game DECIMATED Launches On Epic Store
Too Long; Didn't ReadThis rich narrative is further enhanced by offering players the opportunity to...
2024-5-8 01:45:41 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
treasures
perils
readthis
narrative
enhanced
Hunters Announces Full Adoption Of OCSF And Introduces OCSF-Native Search
New Story by Cyber Wire4mMay 7th, 2024Too Long; Didn't ReadThis strategic advancement underscores...
2024-5-8 01:42:59 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
wire
readthis
strategic
hunters
Scene Graphs & WikiData in Meme Analysis: Advancing Hate Speech Detection
Too Long; Didn't ReadIntegrating scene graphs and WikiData into meme analysis significantly enhances...
2024-5-8 01:39:17 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
meme
scene
analysis
Human Augmentation in Meme Analysis: Learnings and Challenges
Human Augmentation in Meme Analysis: Learnings and Challenges by@memeologyToo Long; Didn't ReadHuman...
2024-5-8 01:39:12 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
biological
analysis
linking
transmitted
Join the Bitcoin Meets Solidity Hackathon, Compete for $17,000 in Prizes!
Join the Bitcoin Meets Solidity Hackathon, Compete for $17,000 in Prizes! by@rootstock_ioToo Long; D...
2024-5-7 23:0:12 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
hackathon
developers
solidity
thriving
The Opt Out Writing Contest: Round 1 Results Announced!
Too Long; Didn't ReadThe winners of the Opt Out Writing Contest, showcasing themes of autonomy, self...
2024-5-7 23:0:9 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
voices
narratives
readthe
winners
contest
The Visual Framing of COVID-19 on Search Engines
Too Long; Didn't ReadTo investigate how COVID-19 is framed visually via search engines, we collected...
2024-5-7 23:0:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
yandex
visually
bing
markets
russia
Strategies for Responsible AI Governance
Too Long; Didn't ReadAs AI's influence grows, robust governance becomes essential. From discriminati...
2024-5-7 21:39:22 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
governance
security
ethical
laying
The 2.0 Conferences Spark Global Conversations With HackerNoon As Esteemed Media Partner
Too Long; Didn't ReadThe 2.0 Conferences series featuring five global events were successfully hoste...
2024-5-7 21:33:45 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
dubai
hackernoon
festival
crucial
commitment
MultiBank.io Unveils Gamified Mission Center Rewarding Cryptocurrency Trading
Too Long; Didn't ReadMultiBank.io, a cryptocurrency exchange under MultiBank Group, offers a user-fr...
2024-5-7 21:19:55 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
exchange
multibank
instant
Join Morph’s Revolution With The Launch Of Holesky Testnet
New Story by BTCWire3mMay 7th, 2024Too Long; Didn't ReadThe launch of the Holesky Testnet with its...
2024-5-7 21:12:4 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
7th
holesky
realizing
releasethis
Why Ignoring Sensitive Factors Won't Solve Algorithmic Bias and Discrimination
Too Long; Didn't ReadThe article explains that simply not using sensitive factors like race or sex...
2024-5-7 21:1:21 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
biases
laws
guidelines
combat
chatgpt
Working with wav2vec2 Part 2 - Running Inference on Finetuned ASR Models
read file error: read notes: is a directory...
2024-5-7 21:0:5 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
inference
wav2vec2
xls
explains
speech
The TechBeat: Outlier Detection: What You Need to Know (5/7/2024)
ReadWriteNotificationssee moreThe TechBeat: Outlier Detection: What You Need to Know (5/7/2024) by@...
2024-5-7 14:10:59 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
techbeat
stories
hackernoon
mastering
What Led to Vizualizing the COVID-19 Pandemic: The The Theoretical Background
Too Long; Didn't ReadAccording to Gitlin (1980, 7), frames are "persistent patterns of cognition, in...
2024-5-7 09:4:47 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
frames
mass
interpreted
This Is How the Covid-19 Pandemic Looks Like
Too Long; Didn't ReadIn today’s high-choice media environment, search engines play an integral role...
2024-5-7 08:45:1 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
decide
prioritize
readin
informing
This Is What a Pandemic Looks Like: An Author's Note Before We Begin
Too Long; Didn't ReadThis is the preprint version of the "This is what pandemic looks like: Visual f...
2024-5-7 08:37:18 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
chapter
relations
dfg
reciprocal
Identifiers are better off without meaning
Identifiers are better off without meaning by@srvaroaToo Long; Didn't ReadMeaningful identifiers are...
2024-5-7 08:6:30 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
varoa
scalability
plumbing
identifiers
neck
Previous
139
140
141
142
143
144
145
146
Next