unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to Create a Pronunciation Assessment App (Part 1)
The purpose of this tutorial is to create an application to control the user's pronunciation.To fol...
2024-8-28 09:25:39 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
quasar
sentence
german
learn2speak
Git Commands You're Always Forgetting
Did you find yourself cursing at your terminal because you forgot that one Git command? Yeah, me too...
2024-8-28 09:4:54 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
remote
stash
ssh
annotated
hotfix
How to Add Full Text Search to Your Django App with django-watson
In today's blog post, we're going to explore how you can enhance the search functionality of your Dj...
2024-8-28 08:55:12 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
watson
django
tsvector
python
appconfig
Insights and Tips From a Lead Engineer
Too Long; Didn't ReadI want to share my thoughts, tips, and advice based on what I've learned from m...
2024-8-28 07:52:7 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
tips
experiences
thoughts
advice
improvement
Detailed Experimentation and Comparisons for Continual Learning Methods
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:48 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
replay
accuracy
epochs
continual
tübingen
How Our Disentangled Learning Framework Tackles Lifelong Learning Challenges
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:37 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
continual
arxiv
advances
machine
proceedings
Batch Training vs. Online Learning
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:27 | 阅读: 12 |
收藏
|
Hacker Noon - hackernoon.com
tübingen
continual
experiments
leuven
ku
One-Shot Generalization and Open-Set Classification
Authors:(1) Sebastian Dziadzio, University of Tübingen ([email protected]);(2) Çagatay Yıldız, Un...
2024-8-28 07:0:20 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
shot
exemplars
shapes
novel
continual
Boosting Product Discovery With UX Research: Lessons From Retail and Banking
I had the opportunity to upgrade a product discovery process for designing and testing new ideas in...
2024-8-28 05:27:3 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
development
ux
retail
processes
client
What is SaaS? The Ultimate Guide to Software
Software as a Service (SaaS) is the epitome of how businesses and people access software application...
2024-8-28 04:51:8 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
software
maintenance
iaas
premises
paas
Building Hyper-Personalized Customer Experience in Digital: Time to Take Things Personally?
AI-powered hyper-personalization can deliver value to customers by crunching data at enormous capaci...
2024-8-28 04:14:59 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
tailored
Four Things I Did Differently When Writing a Frontend Framework
Back in 2013 I set out to build a minimalist set of tools for developing web applications. Perhaps t...
2024-8-28 03:0:22 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
responders
templating
responder
literals
todos
How I Built a Facial Recognition Application Using JavaScript and the Luxand.cloud API
Building a facial recognition application with JavaScript might seem like a daunting task, but it's...
2024-8-28 03:0:19 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
formdata
myheaders
recognize
cloud
Pavel Durov Arrest: Is This a Fight Against Crime or an Attempt to Censor Telegram?
Pavel Durov was detained at Paris Le Bourget airport while leaving his private jet. The price of TON...
2024-8-28 00:42:15 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
durov
french
messenger
france
arrest
OpenTelemetry SDK: Concepts & Design
IntroOpenTelemetry is an observability framework and an active CNCF project that provides a vendor-...
2024-8-28 00:27:4 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
otel
metric
spans
Why Software Updates Can Lead to Cyberattacks — and What to Do
Software updates are essential for keeping systems running and patching known vulnerabilities, so ho...
2024-8-28 00:18:37 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
software
attackers
Breaking Barriers in AI: Insights from Aditi Godbole, a Senior Data Scientist at SAP
HackerNoon editorial team has launched this interview series with women in tech to celebrate their a...
2024-8-28 00:12:57 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
biases
development
career
girls
gap
The Noonification: Transformers: Age of Attention (8/27/2024)
2024-8-28 00:4:50 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
glassfish
hackernoon
designers
planet
Key Endpoints For Blockchain APIs: Ethereum, Bitcoin, Polygon, Binance Smart Chain, And Solana
Hey there! I have been for a long time in dApps developement and I know on my own how it is difficul...
2024-8-27 23:58:59 | 阅读: 13 |
收藏
|
Hacker Noon - hackernoon.com
retrieves
bnb
blockchain
fetches
solana
OpenShift Virtualization: Unify, Manage and Scale Hybrid Cloud
Virtualization has been a cornerstone of modern IT infrastructure for decades, but the rise of cloud...
2024-8-27 23:41:46 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
openshift
cloud
vms
workloads
Previous
27
28
29
30
31
32
33
34
Next