unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Top C# .NET Spreadsheets
Spreadsheet capabilities for .NET desktop and web applications have become a standard. While there a...
2024-10-23 04:53:37 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
spreadsheet
ribbon
formulas
charts
formatting
INE Security Launches New Training Solutions To Enhance Cyber Hygiene For SMBs
CARY, NC, October 22nd, 2024/CyberNewsWire/--INE Security offers essential advice to protect digital...
2024-10-23 03:33:44 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
ine
network
software
Decentraland Launches Revamped Virtual World
**LOS ANGELES, USA, October 22nd, 2024/Chainwire/--**Decentraland, the first decentralized virtual s...
2024-10-23 03:20:21 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
client
immersive
experiences
Aventus Network Confirms Launch Of Aventus 2.0, Key To Driving Enterprise Use Cases To Polkadot
**LONDON, United Kingdom, October 22nd, 2024/Chainwire/--**Aventus, a leading provider of enterprise...
2024-10-23 03:9:51 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
aventus
network
blockchain
liquidity
web3
AI Deception: How Generative AI is Being Weaponized for Fraud
Generative AI technology that can be used to create fresh content like text, images, audio, and even...
2024-10-23 03:0:28 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
generative
fraudsters
deepfake
convincing
deepfakes
AI is Failing in Cyber
In October 2022 I published the most embarrassing article of my career, but 2 years later I am start...
2024-10-23 03:0:24 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
security
chatgpt
blackhat
slogans
bold
0G Foundation Launches Node Sale for Decentralized AI Network Verification
The 0G Foundation announced Tuesday it will launch a public sale of nodes for its decentralized arti...
2024-10-22 23:9:52 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
sale
network
Startups of The Year: How To Vote
It’s time to support the best startups!You learned how to nominate, now it’s time to learn how to v...
2024-10-22 23:0:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
startups
hackernoon
votes
industries
nominated
How to Generate EKS Worker Node Image - Windows 2019 Update 2004/20H2
BackgroundDevOps teams face numerous challenges during the modernization of CI/CD build systems. On...
2024-10-22 22:10:35 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
ami
windows
recipe
20h2
eks
From Playful Ideas to Powerful Tools: Building with Passion for Construction
Fast Builds, Lasting Impact“For the past several years, I have worked as a full-stack developer in...
2024-10-22 22:7:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
mdlr
dashboards
developer
aim
Classification of Computing in Memory Principles - Digital Computing in Memory Vs. Analog Computing
As a new type of architecture, the integration of data storage and computation is expected to break...
2024-10-22 21:57:39 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
memory
consumption
chip
computation
analog
Navigating HR Compliance with Care: Introducing CraveHRO, Startups of the Year 2024 Nominee
Please vote for us here:Read more about us below to understand why we deserve your vote.Meet Crav...
2024-10-22 21:53:37 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
cravehro
workplace
employers
client
innovative
Asymmetric Research Joins Stacks Ecosystem as Security Contributor to Bitcoin L2
Security firm Asymmetric Research will serve as a core security contributor to the Bitcoin Layer 2 p...
2024-10-22 21:38:44 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
security
asymmetric
sbtc
network
The Individualist’s Manifesto
Another day, another expectation placed on me, another cage to shatter. “Follow the path,” they say,...
2024-10-22 21:37:24 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
damn
guilty
crime
merit
alike
Extending GNN Learning: 11 Additional Framework Applications
Authors:(1) Junwei Su, Department of Computer Science, the University of Hong Kong and [email prot...
2024-10-22 18:0:15 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
shot
structural
kong
theorem
labelled
Comprehensive Overview of GNN Experiments: Hardware, Hyperparameters, and Findings
Authors:(1) Junwei Su, Department of Computer Science, the University of Hong Kong and [email prot...
2024-10-22 17:0:13 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
experiments
vertices
embedding
distances
fig
Meet GGEZ1, Startups of the Year 2024 Nominee
Hey Hackers,I’m excited to announce that GGEZ1 has been nominated for HackerNoon’s Startups of the...
2024-10-22 16:44:5 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
backed
ggez1
blockchain
stablecoins
From Side-Hustle to Breakthroughs: How FoundersToday is Revolutionizing Media for Startups
Hey Hackers,FoundersToday Media GmbH has been nominated in HackerNoon's annual Startups of The Year...
2024-10-22 16:34:9 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
startups
growth
hackernoon
Introducing the Tonomy Foundation and Pangea Virtual Nation, Startups of the Year 2024 Nominee
Tonomy Foundation has been nominated in HackerNoon's annual Startups of The Year awards in Amsterdam...
2024-10-22 16:26:18 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
governance
pangea
startups
hackernoon
Optimizing GNNs: A Sampling-Based Solution to the k-Center Problem
Authors:(1) Junwei Su, Department of Computer Science, the University of Hong Kong and [email prot...
2024-10-22 16:0:18 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
greedy
sampling
theorem
kong
solving
Previous
35
36
37
38
39
40
41
42
Next