.gif)
Trending Technology StoriesFrom January 29, 2024
Using Witnet to Overcome The Challenges of Developing A Truly Multichain Oracle Network
Tomas Ruiz on overcoming the challenges of developing a truly multi-chain oracle network using Witnet.
A Deep Dive on Digital Identity: Why You Need to Check Out Genies Traits Framework
What if your avatar in the Genies Ecosystem encoded not only your visual representation but also who you are –...
A Beginner's Guide to Understanding SQL Window Functions - Part 2
let us explore more advanced SQL concepts. It may sound a bit complicated at first glance, but I will provide...
Unveiling the Best of 2023: Top Stories, Writers, Tech Categories, and Templates! 📚
We've compiled a 2023 roundup of the top most-read stories, top active writers, top tech categories, and even the top...
Product Managers, Designers, and Devs: What Does Their Future Look Like in a World Filled With AI?
The predictions for the future of tech jobs and the macro trends that will impact our collective experience
Improving Testing Algorithms: Mathematical Approaches in Software Testing
Test design, Code coverage, MC/DC, Boolean algebra, Pairwise testing, Combinatorial testing, Orthogonal arrays, System states
Cybersecurity Essentials: Practical Web App Security Testing Tips for QA Engineers
Cybersecurity for QA - web app security: XSS, Header Injections, CSRF, RCE, Command Injection, Web Parameter Tampering, CORS, Content Security...
Stand Up for the Champion Startups of the Year!
The Startups of the Year 2023 winners are announced!
The Noonification: A Deep Dive Into Semantic Segmentation Evaluation Metrics (1/28/2024)
1/28/2024: Top 5 stories on the HackerNoon homepage!
Reverse Proxying — the Backbone of Microservices Architecture
Understand how reverse proxies powers almost every service that we use today from monolith to microservices. It is a vital...
Protect Yourself From Identity Theft By Using Zero-Knowledge Proof, Solidity, and Ethereum
Blockchain technology, specifically Zero-Knowledge Proof (ZKP), Solidity, and Ethereum can provide a secure and efficient solution to prevent identity theft.
The Real-Time Internet: Visions of AI-Generated Everything
I interview an AI engineering expert on her opinion on Jared Ficklin's vision of the Real-Time Internet, where AI generates...
The Best Complex Frontend Architecture: What You Need to Know About Feature-Sliced Design
This article discusses the Feature-Sliced Design architecture, as in my opinion, it is the best for complex frontend projects among...
Multi-Class Classification: Understanding Activation and Loss Functions in Neural Networks
Multi-class classification NN is used with the softmax activation function on its final layer together with CE loss. The final...
Cybersecurity Tips: Vulnerability Scanners Essentials
Cybersecurity Vulnerability Scanners Essentials, OWASP ZAP, Burp Suite, Nessus, Sn1per, Metasploit, SQLMap.
Gamification: A New Era in Workplace Experiences
Explore the impact of low employee motivation and the role of enterprise gamification in boosting engagement, eliminating friction, and fostering...
Bitcoin Mining 2.0 - NFTs and LBH Revolution
Discover How Bitcoin Mining is taking a new dimension with the integration of NFTs and LBH
How to Use TensorFlow and Cleanvision to Detect Starfish Threats in the Great Barrier Reef
Utilizing AI and machine learning, the project employs TensorFlow, Cleanvision, KerasCV, and YOLOv8 to detect harmful starfish in the Great...
Women in Tech: Interview with Anastasia Mironova, Product Designer at WhatsApp London
Interview with Anastasia Mironova: sharing her career journey, perspectives on women in tech, and insights into design leadership