YOLO, You Only Look Once
Family of real time object detection models that predict bounding boxes and classes in a single forward pass, widely used for edge and browser inference.
Family of real time object detection models that predict bounding boxes and classes in a single forward pass, widely used for edge and browser inference.
Pattern based malware detection language used by security teams to hunt for payloads or indicators of compromise in codebases, images, and logs.
Compact hardware security module for server side key storage and signing, used to protect validator keys, hot wallets, and admin credentials in production.
Hardware security key that stores private credentials and performs FIDO2/WebAuthn, OTP, and PIV operations, commonly used for exchange and admin MFA.
Extended private key corresponding to ypub for BIP49 derivations; compromising a yprv exposes all descendant keys for that branch, store with strong isolation.
Version prefix indicating an extended public key for P2WPKH-in-P2SH addresses per BIP49; used by some wallets for format clarity alongside xpub/zpub variants.
Formal specification of the Ethereum protocol covering state transition function, gas costs, and VM semantics, authored initially by Gavin Wood.
Low level, chain agnostic intermediate language used by Solidity and Vyper compilers for optimized bytecode generation and inlined assembly sections.
Receipt token representing a share in a Yearn vault; its price in the underlying asset increases as the strategy harvests and compounds yields.
DeFi protocol offering automated vault strategies and yield products; emits yvTokens as vault receipts that appreciate versus the deposit asset over time.
Token whose balance or exchange rate increases as underlying assets earn interest or rewards, e.g., staked ETH derivatives or vault receipts.