unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
AI Is Making it Easier to Engineer Better Products—Here's How
Building applications that focus on tackling complex business problems and at the same time ensuring...
2025-1-6 09:59:42 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
predictive
development
machine
innovation
indium
Workflow Optimization in Healthcare Insurance: How We Achieved 88% Reduction in Execution Time
Expertise DeliveredBackend, CRM, DevOps & QAIndustryHealthcareOur client,Medigap Life, is a pro...
2025-1-6 09:48:36 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
workflows
client
airflow
medigap
twilio
Top 100 Highest Paying Upwork Clients
Hope you enjoyed the holidays, my fellow freelancers!Here’s how we’re gonna do it. First, go through...
2025-1-6 08:6:23 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
usa
5m
3m
4m
2m
The TechBeat: Programmable Bitcoin Is Here: A Turing-complete Bridgeless Bitcoin Execution Layer (1/6/2025)
2025-1-6 07:10:55 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
cloud
exchange
hackernoon
life360
trending
Google Project IDX, Material UI's New React Component Library, And More - This Week in JS
Hello JavaScript Enthusiasts!The holiday season may be in full swing, but the JavaScript world isn’...
2025-1-5 22:0:3 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
seamless
ghostty
tuning
gemini
apollo
The Crypto Curve: Left, Right, and Center
Intelligence is a broad, relative, highly subjective variable that humans have yet to adequately q...
2025-1-5 18:0:12 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
iq
curvers
emotional
asset
delta
Why Homo Sapiens Are Addicted to Self-Reflections: A Spotify Wrapped Introspective
Spotify Wrapped is a genius move—and no, I’m not exaggerating.Every December, like clockwork, Spo...
2025-1-5 18:0:7 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
wrapped
spotify
habits
growth
listened
Charting The Ethereum Account Abstraction Roadmap I: EIP-3074, EIP-5806, and EIP-7702
Having observed the significant changes that were introduced to Ethereum through the Deneb upgrade,...
2025-1-5 17:21:34 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
eoas
eoa
abstraction
5806
3074
SQL Window Functions: A Quick Review With Examples
IntroductionWindow functions are a powerful feature in SQL used to perform calculations across a se...
2025-1-5 17:0:4 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
north
1300
salesid
900
1200
A Smidge of Behavioral Science at the End of the Year
Dear readers & friends,So, yeah, this year hasn’t exactly been newsletter-heavy from my side, and I...
2025-1-5 16:45:14 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
newsletter
behavioral
publishing
nudging
applying
The HackerNoon Newsletter: GPS Is Broken, And Its Holding Tech Back (1/5/2025)
2025-1-5 16:5:36 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
overlord
hackernoon
wildcat
defi
Agile: How to Write User Stories for Beginners
IntroductionOver my time as a Software Engineer, I’ve seen many ways people plan software projects...
2025-1-5 16:0:3 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
stories
acceptance
criteria
developers
scrum
The TechBeat: Unpacking The Starknet Bolt Upgrade (1/5/2025)
2025-1-5 07:10:57 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
defi
hackernoon
lending
rollups
Why Is JavaScript Benchmarking a Mess?
I hate benchmarking code, just like any human (which, at this point, most viewers of this probably a...
2025-1-4 21:0:15 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
timing
bun
factorial
PagedAttention and vLLM Explained: What Are They?
Table of LinksAbstract and 1 Introduction2 Background and 2.1 Transformer-Based Large Language Mod...
2025-1-4 18:45:3 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
arxiv
usenix
preprint
memory
serving
General Model Serving Systems and Memory Optimizations Explained
Table of LinksAbstract and 1 Introduction2 Background and 2.1 Transformer-Based Large Language Mod...
2025-1-4 18:30:3 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
serving
memory
berkeley
orca
vllm
Applying the Virtual Memory and Paging Technique: A Discussion
Table of LinksAbstract and 1 Introduction2 Background and 2.1 Transformer-Based Large Language Mod...
2025-1-4 18:15:2 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
memory
berkeley
vllm
paging
llm
Evaluating vLLM's Design Choices With Ablation Experiments
Table of LinksAbstract and 1 Introduction2 Background and 2.1 Transformer-Based Large Language Mod...
2025-1-4 18:0:9 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
sizes
vllm
berkeley
swapping
Encryption: Ciphers, Digests, Salt, and IV - What You Need to Know
What Is Encryption?Encryption is a method of turning data into an unusable form that can be made us...
2025-1-4 18:0:4 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
salt
gg
encryption
digest
sesame
How We Implemented a Chatbot Into Our LLM
Table of LinksAbstract and 1 Introduction2 Background and 2.1 Transformer-Based Large Language Mod...
2025-1-4 16:15:3 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
berkeley
chatbot
baselines
memory
hao
Previous
10
11
12
13
14
15
16
17
Next