Explore
Curator's Pick
Login
Sign up
scipio
1914 Followers
112 Following
Does it matter who's right, or who's left?
Blog
Comments
Replies
Connections
Wallet
@scipio
0
about 4 hours ago
StemSocial
Learn Ethical Hacking (#12) - SQL Injection - The Bug That Won't Die
Learn Ethical Hacking (#12) - SQL Injection - The Bug That Won't Die What will I learn What SQL injection is and why it has persisted for 25+ years; Identifying injection p
@scipio
0
about 8 hours ago
StemSocial
Learn AI Series (#49) - LSTM and GRU - Solving the Memory Problem
Learn AI Series (#49) - LSTM and GRU - Solving the Memory Problem What will I learn You will learn how the LSTM's three gates (forget, input, output) control information flow
@scipio
0
about 21 hours ago
StemSocial
Learn Zig Series (#30) - Thread Safety and Atomics
Learn Zig Series (#30) - Thread Safety and Atomics What will I learn You will learn how to write solutions for the Episode 29 exercises; You will learn creating…
@scipio
0
1 day ago
StemSocial
Learn Ethical Hacking (#11) - HTTP Deep Dive - Request Smuggling and Header Injection
Learn Ethical Hacking (#11) - HTTP Deep Dive - Request Smuggling and Header Injection What will I learn HTTP beyond the basics: methods, headers, status codes, and cookies from t
@scipio
0
1 day ago
StemSocial
Learn AI Series (#48) - Recurrent Neural Networks - Sequences
Learn AI Series (#48) - Recurrent Neural Networks - Sequences What will I learn You will learn why order matters -- and why feedforward networks can't handle sequential data;
@scipio
0
2 days ago
StemSocial
Learn Zig Series (#29) - Inline Assembly and Low-Level Control
Learn Zig Series (#29) - Inline Assembly and Low-Level Control What will I learn You will learn how to write solutions for the Episode 28 exercises; You will learn…
@scipio
0
2 days ago
StemSocial
Learn Ethical Hacking (#10) - The Vulnerability Lifecycle - From Discovery to Patch to Exploit
Learn Ethical Hacking (#10) - The Vulnerability Lifecycle - From Discovery to Patch to Exploit What will I learn The complete vulnerability lifecycle : discovery, disclosure, patc
@scipio
0
2 days ago
StemSocial
Learn AI Series (#47) - CNN Applications - Detection, Segmentation, Style Transfer
Learn AI Series (#47) - CNN Applications - Detection, Segmentation, Style Transfer What will I learn You will learn image classification beyond basic accuracy -- top-K predic
@scipio
0
3 days ago
StemSocial
Learn Zig Series (#28) - C Interop: Exposing Zig to C
Learn Zig Series (#28) - C Interop: Exposing Zig to C What will I learn You will learn the export keyword for making Zig functions callable from C; You will learn…
@scipio
0
3 days ago
StemSocial
Learn Ethical Hacking (#9) - Cryptography for Hackers - What Protects Data (and What Doesn't)
Learn Ethical Hacking (#9) - Cryptography for Hackers - What Protects Data (and What Doesn't) What will I learn Symmetric encryption (AES) vs asymmetric encryption (RSA) -- w
Menu
Explore
Curator's Pick
Trade
Trade STEM
Swap