unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Here's How to Prove AI Is Not Creative
In the same way that a young city slicker impresses the folks back home with stories of life in the...
2024-7-16 04:52:0 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
goat
wolf
cabbage
llm
farmer
6 Pointers to Look for When Choosing a CRM Software in 2024
As personalization became the order of the day in fields like customer service, marketing, and sales...
2024-7-16 04:49:56 | 阅读: 11 |
收藏
|
Hacker Noon - hackernoon.com
scalability
security
The Step-by-Step Guide to Deploying Your Next.js App to Firebase Hosting
In this tutorial, I’ll show you how to deploy a full-stack JavaScript web app into Firebase. We’ll d...
2024-7-16 04:43:1 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
firebase
github
cloud
npx
blaze
The Crowded AI Spaces Still Have Room for One More Genius
Thank you for the valuable input and feedback from Zhenyang at Upshot, Fran at Giza, Ashely at Neur...
2024-7-16 04:39:42 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
inference
developers
network
blockchain
Match Systems' CEO Andrei Kutin Provides Insight On DMM Bitcoin Breach
**DUBAI, UAE, July 15th, 2024/CyberNewsWire/--**On May 31, 2024, as a result of the hacking 4502.9 B...
2024-7-16 01:24:28 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
exchange
btc
funds
dmm
occurred
The Noonification: The Snowflake Hack and Its Domino Effect (7/15/2024)
2024-7-16 00:5:22 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
hackernoon
collective
prizes
contest
bosch
The Snowflake Hack and Its Domino Effect
In the high-stakes world of data management, a single crack in the foundation can bring down an enti...
2024-7-15 23:38:50 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
security
zones
snowflake
analysis
fortress
Enhancing Digital Security with AI Image and Video Detectors
Image: SourceEnhancing security is more critical than ever. One of the cutting-edge solutions is us...
2024-7-15 23:28:49 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
detectors
security
threats
analysis
identify
A Concept of Collective aI on Ethereum and Ethereum Swarm
Currently, the key players in AI can be divided into two major groups: supporters of open-source AI...
2024-7-15 23:8:48 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
computation
reward
database
Enter the #ethereum Writing Contest and Compete for $1,000 in Prizes
Contests on HackerNoon are the gifts that keep on giving!Today, we're excited to unwrap another oppo...
2024-7-15 23:0:17 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
contest
hackernoon
finance
stories
trustless
Why Are Aussies Still Sticking With High-Cost Internet Providers?
It's baffling to see so many Australians clinging to Telstra, the giant of the NBN internet scene, d...
2024-7-15 22:12:34 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
newer
isps
nbn
australians
telstra
Automated A/B Testing: 5 Ways To Use ML To Improve Your UX Design
The UX design scene is quickly becoming the newest arena for AI-powered innovation. As an industry a...
2024-7-15 22:7:43 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
ux
machine
designers
chatgpt
Code Smell 258 - The Dangers of Hardcoding Secrets
The Dangers of Hardcoding SecretsTL;DR: Use a secret manager to avoid hardcoding sensitive informa...
2024-7-15 22:3:56 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
security
smell
hardcoded
codebase
hardcoding
Exploring Bitcoin DeFi With BITLiquidity CEO Simo Vukmirica
The emergence of BRC-20 tokens has indubitably unlocked a new era of development within the Bitcoin...
2024-7-15 22:0:37 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
defi
brc
btc
erc
Meet Bosch: HackerNoon Company of the Week
We are back with another Company of the Week feature! Every week, we share an awesome tech brand fro...
2024-7-15 22:0:17 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
bosch
hackernoon
database
advertise
artificial
Actionable Threat Intelligence at Google Scale: Meet Google Threat Intelligence Powered by Gemini
For decades, threat intelligence solutions have had two main challenges: They lack a comprehensive v...
2024-7-15 12:57:21 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
security
cloud
mandiant
gemini
threats
Reflection: Top 5 Tips to Bootstrap From $1.5K to $16K Monthly Revenue and Raise $400K
Building a two-sided managed pet care platform as first-time founders is not an easy task. Looking b...
2024-7-15 03:0:22 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
pet
investors
caregivers
advisor
stage
How Build Your Own AI Confessional: How to Add a Voice to the LLM
While OpenAI is delaying the release of the advanced Voice Modes for ChatGPT, I want to share how we...
2024-7-15 01:0:14 | 阅读: 10 |
收藏
|
Hacker Noon - hackernoon.com
speech
llm
booth
microphone
sensor
The Noonification: BEP 341: Consecutive Block Production (7/14/2024)
2024-7-15 00:4:22 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
sonnet
hackernoon
claude
rootstock
savaliya
How to Improve Cybersecurity With Digital Twins
Digital twins are highly accurate virtual versions of real-life places or things. They have become w...
2024-7-14 22:0:13 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
twins
twin
threats
Previous
72
73
74
75
76
77
78
79
Next