Aggregator
cronjobs to get YouTube views
9 months ago
cronjobs to get YouTube views
苹果引入百度 AI 面临诸多挑战
9 months ago
The Information 报道,苹果和百度合作为中国版 iPhone 引入 AI 功能面临诸多挑战。消息人士称,苹果和百度工程师正在改进百度大语言模型,使其能更好地服务 iPhone 用户。但据一位了解项目情况的人士表示,这些模型在理解用户提示和对常见场景作出准确响应方面,仍然存在困难。分析认为,若问题无法解决,可能会让苹果在中国市场提振 iPhone 销量的希望遭到打击。苹果与百度的合作主要围绕百度文心大模型 4.0 展开,该模型将被整合到 Apple Intelligence 中,以提升设备的人工智能体验。由于中国对人工智能技术的严格监管,尤其是对数据安全和用户隐私的高标准要求,Apple Intelligence 在国内的落地面临诸多限制。苹果的隐私政策明确禁止将用户数据用于 AI 训练,这与百度希望收集和分析 iPhone 用户数据以优化其 AI 模型的做法产生了直接冲突。苹果强调用户数据的安全性和隐私保护,在合作中坚持不使用用户数据进行 AI 模型的训练和改进。
苹果将从iPhone 17开始在入门机型中使用自研5G基带芯片进行测试
9 months ago
苹果将从iPhone 17开始在入门机型中使用自研5G基带芯片进行测试
who knows how to RAT? hmu
9 months ago
who knows how to RAT? hmu
微软正在修复Windows 11更换主板后无法激活的问题 遇到该问题的用户还需稍等
9 months ago
微软正在修复Windows 11更换主板后无法激活的问题 遇到该问题的用户还需稍等
全球首台骁龙X Elite迷你机积核QS1配置曝光 最高64GB内存并提供4.6TFLOPs算力
9 months ago
全球首台骁龙X Elite迷你机积核QS1配置曝光 最高64GB内存并提供4.6TFLOPs算力
CVE-2003-0865 | mpg123 0.59r/0.59s HTTP Request httpget.c memory corruption (EDB-23171 / Nessus ID 15272)
9 months ago
A vulnerability was found in mpg123 0.59r/0.59s. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file httpget.c of the component HTTP Request Handler. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2003-0865. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
【情报】12月4日美国国会特别委员会又将新冠病毒甩锅中国
9 months ago
【情报】12月4日美国国会特别委员会又将新冠病毒甩锅中国
CVE-2018-7273 | Linux Kernel up to 4.15.4 Floppy Driver drivers/block/floppy.c show_floppy Variable KASLR information disclosure (EDB-44325 / BID-103088)
9 months ago
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 4.15.4. Affected by this issue is the function show_floppy of the file drivers/block/floppy.c of the component Floppy Driver. The manipulation as part of Variable leads to information disclosure (KASLR).
This vulnerability is handled as CVE-2018-7273. An attack has to be approached locally. Furthermore, there is an exploit available.
vuldb.com
结束高通独占!微软宣布面向Intel+AMD AI设备推出Windows 11回顾功能
9 months ago
结束高通独占!微软宣布面向Intel+AMD AI设备推出Windows 11回顾功能
CVE-2008-1242 | Belkin F5D7230-4 9.01.10 access control (EDB-6305 / XFDB-41120)
9 months ago
A vulnerability was found in Belkin F5D7230-4 9.01.10. It has been rated as very critical. This issue affects some unknown processing. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2008-1242. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
Роскомнадзор готовит зачистку зарубежных хостингов
9 months ago
Как это скажется на рынке?
[ Removed by Reddit ]
9 months ago
[ Removed by Reddit ]
Looking for hacks
9 months ago
Looking for hacks
CVE-2012-4949 | ESRI ArcGIS 10.1 where sql injection (VU#795644 / EDB-38016)
9 months ago
A vulnerability was found in ESRI ArcGIS 10.1. It has been classified as critical. Affected is an unknown function. The manipulation of the argument where leads to sql injection.
This vulnerability is traded as CVE-2012-4949. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
情报分析报告高效撰写:详细指南与资源下载
9 months ago
谋智基金会宣布对品牌LOGO进行重塑 但和火狐浏览器基本没有关系
9 months ago
谋智基金会宣布对品牌LOGO进行重塑 但和火狐浏览器基本没有关系
CVE-2000-0703 | Larry Wall Perl 5.4.5/5.5/5.5.3/5.6 /bin/mail interactive privileges management (EDB-20141 / BID-1547)
9 months ago
A vulnerability was found in Larry Wall Perl 5.4.5/5.5/5.5.3/5.6 and classified as critical. This issue affects some unknown processing of the file /bin/mail. The manipulation of the argument interactive with the input ~! as part of Environment Variable leads to improper privilege management.
The identification of this vulnerability is CVE-2000-0703. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Sequence Length Limitation in Transformer Models: How Do We Overcome Memory Constraints?
9 months ago
Sequence Length Limitation in Transformer Models: How Do We Overcome Memory Constraints?