吉祥寺北口システムが気になった記事をクリップしています。タイトルから元記事にリンクしています。タグは記事タイトルを形態素分析しています。たまにコメントをつけています。
Uses
Cloudflare now uses post-quantum cryptography to talk to your origin server
CloudFlare
(573)
Cryptography
(8)
now
(622)
origin
(42)
Post
(72)
Quantum
(53)
Server
(698)
Talk
(44)
to
(3295)
Uses
(27)
Your
(539)
Infineon uses recyclable PCBs from Jiva Materials to minimize electronic waste and carbon footprint of demo and evaluation boards – Infineon Technologies
and
(3289)
Boards
(2)
Carbon
(40)
Demo
(28)
Electronic
(56)
Evaluation
(15)
footprint
(13)
from
(593)
Infineon
(7)
Jiva
(1)
Materials
(24)
minimize
(4)
of
(3341)
PCBs
(1)
recyclable
(1)
Technologies
(229)
to
(3295)
Uses
(27)
Waste
(10)
GitHub – oracle-samples/bpftune: bpftune uses BPF to auto-tune Linux systems
Auto
(64)
BPF
(3)
bpftune
(3)
GitHub
(873)
Linux
(1215)
Oracle
(873)
Samples
(6)
Systems
(251)
to
(3295)
Tune
(5)
Uses
(27)
How Google Maps uses machine learning to fight fake contributions
contributions
(2)
Fake
(43)
Fight
(32)
Google
(5828)
how
(301)
Learning
(125)
Machine
(118)
Maps
(106)
to
(3295)
Uses
(27)
How Meta Uses Legal Bases for Processing Ads in the EU | Meta
Ads
(222)
bases
(7)
EU
(181)
for
(5179)
how
(301)
in
(2447)
Legal
(13)
Meta
(161)
Processing
(27)
the
(4365)
Uses
(27)
The Cloudflare API now uses OpenAPI schemas
API
(1104)
CloudFlare
(573)
now
(622)
OpenAPI
(5)
schemas
(1)
the
(4365)
Uses
(27)
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow
execution
(116)
flow
(54)
hijack
(4)
Linux
(1215)
new
(1446)
of
(3341)
Orbit
(29)
Threat
(118)
Undetected
(1)
Unique
(13)
Uses
(27)
HTTPS Everywhere Now Uses DuckDuckGo’s Smarter Encryption | Electronic Frontier Foundation
DuckDuckGo’s
(1)
Electronic
(56)
Encryption
(36)
everywhere
(15)
Foundation
(390)
Frontier
(39)
HTTPS
(417)
now
(622)
Smarter
(24)
Uses
(27)
CD Projekt Red Uses DMCA to Take Down Tweets Sharing Stolen Game Code
CD
(120)
Code
(400)
DMCA
(65)
down
(57)
Game
(3145)
Projekt
(2)
Red
(345)
Sharing
(48)
stolen
(10)
Take
(37)
to
(3295)
Tweets
(26)
Uses
(27)
FDA Approves First-of-its-Kind Intentional Genomic Alteration in Line of Domestic Pigs for Both Human Food, Potential Therapeutic Uses | FDA
Alteration
(2)
approves
(8)
Both
(16)
Domestic
(10)
FDA
(79)
First-of-its-Kind
(2)
Food
(55)
for
(5179)
Genomic
(4)
human
(101)
in
(2447)
Intentional
(1)
LINE
(2409)
of
(3341)
Pigs
(3)
potential
(39)
therapeutic
(4)
Uses
(27)
VU#490028 – Microsoft Windows Netlogon Remote Protocol (MS-NRPC) uses insecure AES-CFB8 initialization vector
490028
(1)
AES-CFB
(1)
initialization
(1)
insecure
(9)
Microsoft
(4459)
MS-NRPC
(3)
Netlogon
(8)
Protocol
(58)
Remote
(203)
Uses
(27)
vector
(12)
VU
(109)
Windows
(3425)
TachibanaYoshino/AnimeGAN: A Tensorflow implementation of AnimeGAN for fast photo animation ! This is the Open source of the paper , which uses the GAN framwork to transform real-world photos into anime images.
Animation
(9)
Anime
(17)
AnimeGAN
(1)
Fast
(86)
for
(5179)
framwork
(2)
GAN
(11)
Images
(56)
implementation
(26)
into
(143)
is
(1010)
Lightweight
(11)
novel
(17)
of
(3341)
Open
(594)
Paper
(28)
Photo
(32)
photos
(54)
real-world
(5)
Source
(283)
TachibanaYoshino
(1)
TensorFlow
(48)
the
(4365)
this
(95)
to
(3295)
Transform
(15)
Uses
(27)
which
(16)
Human sperm uses asymmetric and anisotropic flagellar controls to regulate swimming symmetry and cell steering | Science Advances
Advances
(31)
and
(3289)
anisotropic
(1)
asymmetric
(1)
CELL
(31)
Controls
(59)
flagellar
(1)
human
(101)
regulate
(5)
Science
(186)
sperm
(3)
Steering
(3)
swimming
(6)
symmetry
(3)
to
(3295)
Uses
(27)
NTT DATA Japan Uses Twitter Data to Improve Future Tourism
data
(834)
Future
(170)
improve
(29)
NTT
(3720)
to
(3295)
Tourism
(7)
Twitter
(2191)
Uses
(27)
Farmer Connect Uses IBM Blockchain to Bridge the Gap Between Consumers and Smallholder Coffee Farmers – Jan 6, 2020
2020
(1856)
and
(3289)
Between
(34)
blockchain
(119)
Bridge
(55)
Coffee
(29)
Connect
(563)
Consumers
(38)
Farmer
(4)
Farmers
(2)
GAP
(11)
IBM
(738)
Jan
(18)
Smallholder
(1)
the
(4365)
to
(3295)
Uses
(27)
International Payments Specialist Mercury FX Uses Ripple to Access Inaccessible Markets | Ripple
Access
(296)
FX
(48)
Inaccessible
(1)
International
(105)
Markets
(22)
Mercury
(8)
Payments
(27)
Ripple
(38)
Specialist
(3)
to
(3295)
Uses
(27)
AI Uses GANs to Turns Pets into GANimals | NVIDIA Blog
ai
(5172)
Blog
(6451)
GANimals
(1)
GANs
(2)
into
(143)
NVIDIA
(238)
Pets
(1)
to
(3295)
turns
(15)
Uses
(27)
Chromium Blog: Potential uses for the Privacy Sandbox
Blog
(6451)
Chromium
(153)
for
(5179)
potential
(39)
Privacy
(114)
Sandbox
(33)
the
(4365)
Uses
(27)
PLEAD malware now uses compromised routers and likely man-in-the-middle attack against ASUS Webstorage software | ESET
Against
(130)
and
(3289)
ASUS
(88)
Attack
(173)
Compromised
(13)
ESET
(61)
Likely
(11)
malware
(120)
man-in-the-middle
(5)
now
(622)
PLEAD
(4)
Routers
(14)
Software
(386)
Uses
(27)
Webstorage
(1)
VU#174715 – MyCar Controls uses hard-coded credentials
174715
(1)
Controls
(59)
credentials
(18)
hard-coded
(5)
MyCar
(3)
Uses
(27)
VU
(109)
DirectX Developer Blog | World of Warcraft uses DirectX 12 running on Windows 7
12
(1322)
Blog
(6451)
Developer
(363)
DirectX
(17)
of
(3341)
on
(1868)
Running
(27)
Uses
(27)
Warcraft
(3)
Windows
(3425)
world
(293)
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency | McAfee Blogs
Blogs
(532)
Computers
(22)
Cryptocurrency
(23)
malware
(120)
McAfee
(102)
Mine
(14)
to
(3295)
Uses
(27)
victims
(10)
WebCobra
(2)
Apple Confirms It Uses Google Cloud for iCloud | HYPEBEAST
apple
(3294)
Cloud
(2171)
Confirms
(25)
for
(5179)
Google
(5828)
Hypebeast
(80)
iCloud
(88)
IT
(1202)
Uses
(27)
TrendLabs Security Intelligence BlogMouse Over, Macro: Spam Run in Europe Uses Hover Action to Deliver Banking Trojan – TrendLabs Security Intelligence Blog
Action
(87)
Banking
(11)
Blog
(6451)
BlogMouse
(1)
deliver
(37)
Europe
(47)
Hover
(3)
in
(2447)
Intelligence
(156)
Macro
(3)
over
(141)
Run
(74)
Security
(5710)
spam
(32)
to
(3295)
TrendLabs
(17)
Trojan
(21)
Uses
(27)
“Thunderstrike 2” rootkit uses Thunderbolt accessories to infect Mac firmware | Ars Technica
Accessories
(7)
Ars
(21)
Firmware
(22)
infect
(3)
Mac
(528)
rootkit
(9)
Technica
(17)
Thunderbolt
(18)
Thunderstrike
(4)
to
(3295)
Uses
(27)
Vulnerability Note VU#260780 – NetNanny uses a shared private key and root CA
and
(3289)
CA
(127)
Key
(83)
NetNanny
(1)
Note
(304)
Private
(126)
root
(52)
shared
(21)
Uses
(27)
VU
(109)
Vulnerability
(515)
iWorm Botnet Uses Reddit as Command and Control Center | The Mac Security Blog
and
(3289)
As
(303)
Blog
(6451)
botnet
(13)
Center
(743)
Command
(76)
Control
(135)
iWorm
(6)
Mac
(528)
Reddit
(39)
Security
(5710)
the
(4365)
Uses
(27)