unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Our Disentangled Learning Framework Tackles Lifelong Learning Challenges
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:37 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
continual
arxiv
advances
machine
proceedings
Batch Training vs. Online Learning
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:27 | 阅读: 13 |
收藏
|
Hacker Noon - hackernoon.com
tübingen
continual
experiments
leuven
ku
One-Shot Generalization and Open-Set Classification
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:20 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
shot
exemplars
shapes
novel
continual
Boosting Product Discovery With UX Research: Lessons From Retail and Banking
I had the opportunity to upgrade a product discovery process for designing and testing new ideas in...
2024-8-28 05:27:3 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
development
ux
retail
processes
client
What is SaaS? The Ultimate Guide to Software
Software as a Service (SaaS) is the epitome of how businesses and people access software application...
2024-8-28 04:51:8 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
software
maintenance
iaas
premises
paas
Building Hyper-Personalized Customer Experience in Digital: Time to Take Things Personally?
AI-powered hyper-personalization can deliver value to customers by crunching data at enormous capaci...
2024-8-28 04:14:59 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
tailored
Four Things I Did Differently When Writing a Frontend Framework
Back in 2013 I set out to build a minimalist set of tools for developing web applications. Perhaps t...
2024-8-28 03:0:22 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
responders
templating
responder
literals
todos
How I Built a Facial Recognition Application Using JavaScript and the Luxand.cloud API
Building a facial recognition application with JavaScript might seem like a daunting task, but it's...
2024-8-28 03:0:19 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
formdata
myheaders
recognize
cloud
Pavel Durov Arrest: Is This a Fight Against Crime or an Attempt to Censor Telegram?
Pavel Durov was detained at Paris Le Bourget airport while leaving his private jet. The price of TON...
2024-8-28 00:42:15 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
durov
french
messenger
france
arrest
OpenTelemetry SDK: Concepts & Design
IntroOpenTelemetry is an observability framework and an active CNCF project that provides a vendor-...
2024-8-28 00:27:4 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
otel
metric
spans
Why Software Updates Can Lead to Cyberattacks — and What to Do
Software updates are essential for keeping systems running and patching known vulnerabilities, so ho...
2024-8-28 00:18:37 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
software
attackers
Breaking Barriers in AI: Insights from Aditi Godbole, a Senior Data Scientist at SAP
HackerNoon editorial team has launched this interview series with women in tech to celebrate their a...
2024-8-28 00:12:57 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
biases
development
career
girls
gap
The Noonification: Transformers: Age of Attention (8/27/2024)
2024-8-28 00:4:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
glassfish
hackernoon
designers
planet
Key Endpoints For Blockchain APIs: Ethereum, Bitcoin, Polygon, Binance Smart Chain, And Solana
Hey there! I have been for a long time in dApps developement and I know on my own how it is difficul...
2024-8-27 23:58:59 | 阅读: 14 |
收藏
|
Hacker Noon - hackernoon.com
retrieves
bnb
blockchain
fetches
solana
OpenShift Virtualization: Unify, Manage and Scale Hybrid Cloud
Virtualization has been a cornerstone of modern IT infrastructure for decades, but the rise of cloud...
2024-8-27 23:41:46 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
openshift
cloud
vms
workloads
Vector Databases in Mobile Applications: Enhancing Data Processing and Performance
In mobile technology, the need for efficient data processing and retrieval has become increasingly c...
2024-8-27 23:39:19 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
similarity
dimensions
cosine
dimensional
analysis
Enhancing Scrum Teams: The Herculean Doughnut Approach
In Scrum teams, discussions, and disagreements regarding titles and accountabilities are common. For...
2024-8-27 23:27:17 | 阅读: 11 |
收藏
|
Hacker Noon - hackernoon.com
scrum
doughnut
sticky
herculean
Redirect HTTP Traffic To HTTPS On An NGINX Server
HTTPS has become a standard for a reliable web presence.In most cases, HTTPS websites are preferred...
2024-8-27 23:9:55 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
directive
redirection
configuring
directives
security
Consciousness: Why Philosophy of Mind May No Longer Be Relevant to Neuroscience
If the purpose is to understand how the brain works, where in the brain is physicalism? Or, where...
2024-8-27 22:44:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
neurons
brain
philosophy
theory
An Architect’s Guide to the Top 10 Tools Needed to Build the Modern Data Lake
I previously wrote about the modern data lake reference architecture, addressing the challenges in e...
2024-8-27 22:11:57 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
lake
warehouse
machine
generative
hugging
Previous
95
96
97
98
99
100
101
102
Next