unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Balance Innovation and Stability in Team Leadership
How to Balance Innovation and Stability in Team Leadership by@pauldhaliwalToo Long; Didn't ReadThis...
2023-12-9 06:21:24 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
stability
innovation
leadership
wphacked
maintaining
CISA adds Qlik bugs to exploited vulnerabilities catalog
Two vulnerabilities affecting a popular data analytics tool were added to the Cybersecurity and Infr...
2023-12-9 06:16:24 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
qlik
ransomware
beaumont
Holiday Extravaganza - Supply Chain, Hardware Hacking, Vulnerabilities, News - PSW #809
Join us for a special extended holiday edition of Paul's Security Weekly! Hosts from all the Sec...
2023-12-9 06:0:0 | 阅读: 1 |
收藏
|
Security Weekly Podcast Network (Audio) - podcast.securityweekly.com
security
psw
weekly
facebook
Enhancing Field Configuration UI: A Chrome Extension for Field Searching
Introduction:As an SAP Ariba technical lead specializing in Buying and Invoicing, I encounte...
2023-12-9 05:28:8 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
chrome
ariba
download
buying
invoicing
Using Build Apps to Create a List Report with Charts ,Tables and Pagination
Prerequisites:Before diving into this guide, it is highly recommended that you review our...
2023-12-9 05:27:43 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
pagevars
odata
formula
charts
The Meme Coin Waves: More Than Just a Joke
The Meme Coin Waves: More Than Just a Joke by@sunnysellaToo Long; Didn't ReadMeme coins, once just t...
2023-12-9 05:27:20 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
coin
meme
ux
readmeme
CAP – Dynamically hide UI facets in Fiori Elements
Prerequisites –Hiding Features Using the UI.Hidden Annotation https://sapui5.hana.ondemand....
2023-12-9 05:24:52 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
reqdata
drafts
Insights into Lot Size-of-One End to End Scenario (55E) based on Configure to Order / Make to Order
IntroductionIn manufacturing industry, there are three main production strategies: Make-to-S...
2023-12-9 05:23:9 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
mto
cto
e2e
avc
Part 2: Deliver real-life use cases with SAP BTP – Returnable Packaging – SAP AI Core
This blog post is the 2nd part of the Deliver real-life use cases with SAP BTP – Returnable Packagin...
2023-12-9 05:21:26 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
bottle
packaging
machine
btp
returnable
SAP Commerce Cloud, composable storefront CDN Caching Recommendations
Composable storefront (aka Spartacus) architecture based on Javascript client application ma...
2023-12-9 05:16:32 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
basesiteid
caching
storefront
composable
warm
SAP Concur User Provisioning: Assigning Entitlements and Roles
This is the fourth post in a six-part series written by SAP Concur Technical Consultants abou...
2023-12-9 05:8:18 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
travel
concur
expense
From Sci-Fi to Reality: The Dawn of Augmented Humanity
From Sci-Fi to Reality: The Dawn of Augmented Humanity by@baldikovToo Long; Didn't Read. It explores...
2023-12-9 05:0:2 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
augmented
fostering
advocating
stories
Google shares “fix” for deleted Google Drive files
error code: 1106...
2023-12-9 04:45:16 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Jump-start your SAP CAP(Node.js) Applications!
This post is about two tools I have been working on over the past 6 months, and now releasing...
2023-12-9 04:40:19 | 阅读: 9 |
收藏
|
SAP Blogs - blogs.sap.com
capgen
developers
github
fiori
WTH is Modern SOC, Part 1
In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusio...
2023-12-9 04:31:39 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
anton
security
humans
soar
1990s
Key takeaways from Sift’s live session with iGaming Business on differentiating between players and fraudsters
Navigating the complex world of online gaming is no easy task for operators. Whether it’s account t...
2023-12-9 04:1:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
igaming
fraudsters
sift
players
curtis
DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’
The ability to recover from failures, high loads and cyberattacks.Continue servicing workload req...
2023-12-9 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
failures
workloads
designing
workload
Add Rows to Planning Data with more Control than “Add Member”
Introduction:The purpose of this blog is to showcase the possibility of adding rows to the p...
2023-12-9 03:51:58 | 阅读: 1 |
收藏
|
SAP Blogs - blogs.sap.com
dimension
planning
dimensions
dim1
measure
Beyond the Algorithm: How Training Data Can Make or Break a Generative AI Model
ReadWriteNotificationssee moreBeyond the Algorithm: How Training Data Can Make or Break a Generativ...
2023-12-9 03:45:49 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
generative
emu
mattheu
chatgpt
FBI explains how companies can delay SEC cyber incident disclosures
The FBI has published guidance on how companies can request a delay in disclosing cyber incidents to...
2023-12-9 03:31:19 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
doj
security
justice
Previous
7
8
9
10
11
12
13
14
Next