unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Causal Analysis – Experimentation (AB Testing) and Statistical Techniques
ReadWriteNotificationssee moreCausal Analysis – Experimentation (AB Testing) and Statistical Techni...
2024-5-7 07:29:29 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
analysis
varunnakra1
nakra
specialist
The Future of Work: Preparing for an AI and Machine Learning Dominated Economy
Too Long; Didn't ReadThe rise of AI and machine learning is set to transform the job market by 2030,...
2024-5-7 05:35:28 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
globally
skill
industries
machine
UK Prohibits '12345' Passwords in Smart Device Security Overhaul
UK Prohibits '12345' Passwords in Smart Device Security Overhaul by@aprilmillerToo Long; Didn't Read...
2024-5-7 05:12:25 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
passwords
security
kingdom
aprilmiller
How to Create a Steel Base Plate Design Web App Using Python and Viktor
Too Long; Didn't ReadThis article guides you through creating a Python-based application for designi...
2024-5-7 04:32:5 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
python
plates
plate
guides
foundations
Elite Teams Are Built on Strong Habits
Too Long; Didn't ReadUtilizing DORA metrics and effective habit formation can elevate a team from av...
2024-5-7 00:52:44 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
software
habit
winning
award
A Beginner's Guide to Pull Request Stacking
Too Long; Didn't ReadPR stacking involves breaking down changes into smaller, manageable pieces in p...
2024-5-7 00:34:45 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
catching
clarity
enhance
stacking
pieces
What Does It Take to Get a Medical Device to Market?
Too Long; Didn't ReadFrom concept to market for medical devices, learn about regulations, developmen...
2024-5-7 00:27:6 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
healthcare
readfrom
regulations
development
postmarket
How I Manage Over a Dozen Startups
Too Long; Didn't ReadThe headline might be a slight exaggeration — I'm not Elon Musk. However, I am...
2024-5-7 00:22:11 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
brands
headline
slight
Is It Game Over for Cheaters? Using Blockchain Technology to Eliminate Unwanted Gaming Behavior
Is It Game Over for Cheaters? Using Blockchain Technology to Eliminate Unwanted Gaming Behavior by@l...
2024-5-7 00:17:51 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
advocate
forager
poet
unwanted
Top 10 Favorite Google Sheets Features for Everyday Work
ReadWriteNotificationssee moreTop 10 Favorite Google Sheets Features for Everyday Work by@proflead...
2024-5-7 00:12:43 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
sheets
proflead
everyday
apisby
Building Resilient Systems With Retry Patterns
Too Long; Didn't ReadThis is an article about designing a retry mechanism for reliable systems. It d...
2024-5-7 00:9:25 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
retries
retry
brilian
resiliency
suitable
How David Wolf Is Building Romantic Relationships at Scale
Too Long; Didn't ReadDigi is an AI-powered chatbot that mimics the natural progression of a relation...
2024-5-7 00:0:3 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
growth
intimacy
quasi
symptoms
mimics
Learn How To Backlink Like a Pro From The HackerNoon Editors
Too Long; Didn't ReadA good set of high-quality backlinks could take a good piece to the next level....
2024-5-6 23:0:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
backlink
tips
editors
reada
linking
How We Analyzed Crypto API Misuses in 895 GitHub Projects
Too Long; Didn't ReadThe methodology involved selecting and analyzing 895 Python repositories from G...
2024-5-6 22:30:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
misuses
selecting
python
github
filtered
Calling All Writers: Learn What The Crypto-API Writing Contest Is All About From The CoinGecko Team
Calling All Writers: Learn What The Crypto-API Writing Contest Is All About From The CoinGecko Team...
2024-5-6 22:30:5 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
contest
insightful
coingecko
intelligent
julia
LICMA's Analysis of Crypto API Misuses in Python Apps: Findings and Future Directions
Too Long; Didn't ReadExplore the insights from LICMA's empirical study on crypto misuses in Python a...
2024-5-6 22:29:54 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
licma
extending
python
security
conducting
Improving Crypto API Misuse Detection: Insights from Previous Static Analysis Approaches
Too Long; Didn't ReadPrevious studies have analyzed crypto misuses across various languages and plat...
2024-5-6 22:29:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
studies
cryptolint
contributed
cryptorex
analysis
Python Crypto API Misuses in the Wild: Analyzing Threats to Validity
Too Long; Didn't ReadValidity concerns in crypto misuse studies include challenges in generalizatio...
2024-5-6 22:29:45 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
studies
analysis
accuracy
limitations
babelfish
A Comparative Analysis of Crypto API Misuses Across Programming Languages
Too Long; Didn't ReadComparative empirical studies reveal that Python's crypto libraries contribute...
2024-5-6 22:29:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
misuses
python
empirical
impacts
ecb
MicroPython Analysis: Exploring Crypto API Usage and Custom Implementations
MicroPython Analysis: Exploring Crypto API Usage and Custom Implementations by@cryptosovereigntyToo...
2024-5-6 22:29:33 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
analysis
micropython
emphasizing
featured
misuses
Previous
140
141
142
143
144
145
146
147
Next