unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Faced With the Demagoguery of Politicians Everywhere in the World, Bitcoin Is Your Best Bulwark
At the start of 2024, you could read everywhere that 2024 would be a historic year for the world in...
2024-6-27 21:10:3 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
election
elections
trump
promises
donald
Fenix Finance Secures $300K Seed Investment from Orbs
Fenix Finance, a decentralized exchange (DEX) operating on the Blast network, has successfully close...
2024-6-27 20:10:40 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
fenix
orbs
liquidity
blast
investment
Google Is Dying
I lived in San Francisco from 2013 to 2021. When I first got there, like many others, I was super ex...
2024-6-27 08:18:42 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
felt
billing
invoicing
monthly
chatgpt
Here's Why React Server Component Is Perfect for Backends-for-Frontends
By now, you should be familiar with React Server Components (RSC) or at least have heard about them....
2024-6-27 08:12:6 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
frontend
rsc
bff
client
network
Survey and Analysis of Smart Contract Quality Assurance: Conclusions, Acknowledgement and References
2024-6-27 08:0:16 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
Python Security Essentials for Your Apps You Need to Know
In July 2020, Twitter faced a serious security breach where high-profile accounts were compromised,...
2024-6-27 07:49:11 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
django
cloudinary
python
The Battle Against L2s: Solana Introduces ZK Compression
Solana has always opted for building a user-friendly blockchain, and this means being heavy on scal...
2024-6-27 07:3:34 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
solana
zk
maximysis
scalability
costs
A Guide to Efficient DevOps Pipelines
Successful projects rely on efficient, reliable DevOps pipelines. This makes it vital for experience...
2024-6-27 06:55:50 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
security
monitoring
pipelines
development
software
Real-World Resilient Strategies for Fintech Projects
Resilience in software refers to the ability of an application to continue functioning smoothly and...
2024-6-27 06:39:8 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
memory
backends
resilience
circuit
retry
Shhh...The Secret to Secrets Management: What You Need to Know
Secrets management is not just about safeguarding sensitive information; it is about ensuring seamle...
2024-6-27 06:31:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
securely
infisical
stage
seamless
Survey and Analysis of Smart Contract Quality Assurance: Evaluation
Authors:(1) ZHIYUAN WEI, Beijing Institute of Technology, China;(2) JING SUN, University of Auckl...
2024-6-27 06:0:13 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
analysis
accuracy
evaluation
datasets
Importing and Exporting Excel XLSX Using Vue: A Guide
“It looks great, but could you just add Excel import?”If you’ve developed software for a long time,...
2024-6-27 05:48:59 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
spreadjs
spreadsheet
vuex
resizable
sheets
How to Speed up Your Angular App With Web Workers
Why do you need a Web Worker? A Web Worker is a code component for a web application. It allows the...
2024-6-27 05:19:28 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
angular
circle
drawing
Machine Learning Enhanced Characterization of Labyrinthine Structures in Bi-doped Films
Authors:(1) Kotaro Shimizu, Department of Physics, University of Virginia, Charlottesville, Virgin...
2024-6-27 05:0:12 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
magnetic
defects
phys
stripe
Lifehack for Product Managers: Boosting Company Performance through Strategic Database Utilisation
My name is Nikita Ivanov and I am a committed Product Owner at Revolut with expertise in data analyt...
2024-6-27 04:33:58 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
development
analysis
analytical
expertise
Fixing the Externally-Managed-Environment Error When Using Pip: A Quick Guide
When you use pip to install Python packages, you may encounter an ‘externally-managed-environment’ e...
2024-6-27 04:26:38 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
python
venv
python3
externally
pipx
BEP 341: Consecutive Block Production
The recently proposed BEP 341 aims to enhance the transaction processing capacity of the BNB Smart C...
2024-6-27 04:22:57 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
341
bep
consecutive
validators
bsc
Survey and Analysis of Smart Contract Quality Assurance: Defense Methodologies
Authors:(1) ZHIYUAN WEI, Beijing Institute of Technology, China;(2) JING SUN, University of Auckl...
2024-6-27 04:0:13 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
symbolic
analysis
machine
security
What the Heck Is Stacks? An Indepth Look Into One of the Largest L2 in the Bitcoin Ecosystem
Table of contentsCreation historyTechnologies and products2.1. Proof-of-Transfer (PoX)2.2. N...
2024-6-27 03:36:57 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
network
stacks
stx
btc
miner
The Open-Source Libraries to Check Out for LLM Building
GPT-2 (XL) has 1.5 billion parameters, and its parameters consume ~3GB of memory in 16-bit precision...
2024-6-27 03:21:45 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
evaluation
llm
llms
memory
deepspeed
Previous
90
91
92
93
94
95
96
97
Next