.gif)
Trending Technology StoriesFrom January 31, 2024
A Deep Dive on Digital Identity: Why You Need to Check Out Genies Traits Framework
What if your avatar in the Genies Ecosystem encoded not only your visual representation but also who you are –...
Using Witnet to Overcome The Challenges of Developing A Truly Multichain Oracle Network
Tomas Ruiz on overcoming the challenges of developing a truly multi-chain oracle network using Witnet.
Product Managers, Designers, and Devs: What Does Their Future Look Like in a World Filled With AI?
The predictions for the future of tech jobs and the macro trends that will impact our collective experience
Unveiling the Best of 2023: Top Stories, Writers, Tech Categories, and Templates! 📚
We've compiled a 2023 roundup of the top most-read stories, top active writers, top tech categories, and even the top...
The System Design Cheat Sheet: Cache
The system design cheat sheet for caching is used to reduce latency and improve the efficiency of data retrieval across...
The Noonification: A Deep Dive Into Semantic Segmentation Evaluation Metrics (1/28/2024)
1/28/2024: Top 5 stories on the HackerNoon homepage!
Improving Testing Algorithms: Mathematical Approaches in Software Testing
Test design, Code coverage, MC/DC, Boolean algebra, Pairwise testing, Combinatorial testing, Orthogonal arrays, System states
Cybersecurity Essentials: Practical Web App Security Testing Tips for QA Engineers
Cybersecurity for QA - web app security: XSS, Header Injections, CSRF, RCE, Command Injection, Web Parameter Tampering, CORS, Content Security...
Cybersecurity Tips: Vulnerability Scanners Essentials
Cybersecurity Vulnerability Scanners Essentials, OWASP ZAP, Burp Suite, Nessus, Sn1per, Metasploit, SQLMap.
What Are Wallet Drainers? How to Protect Yourself From Them!
Learn about wallet drainers, how to detect and respond to compromises, and the role of Wallet Rescue by Hackless in...
Stand Up for the Champion Startups of the Year!
The Startups of the Year 2023 winners are announced!
The Real-Time Internet: Visions of AI-Generated Everything
I interview an AI engineering expert on her opinion on Jared Ficklin's vision of the Real-Time Internet, where AI generates...
Gamification: A New Era in Workplace Experiences
Explore the impact of low employee motivation and the role of enterprise gamification in boosting engagement, eliminating friction, and fostering...
Building a Unicorn: The inDrive Tech Journey from Local Startup to Global Phenomenon
Michil Androsov shares an insider's perspective on how a simple idea from the depths of Siberia grew into a global...
A Beginner's Guide to Understanding SQL Window Functions - Part 2
let us explore more advanced SQL concepts. It may sound a bit complicated at first glance, but I will provide...
The Best Complex Frontend Architecture: What You Need to Know About Feature-Sliced Design
This article discusses the Feature-Sliced Design architecture, as in my opinion, it is the best for complex frontend projects among...
How to Use TensorFlow and Cleanvision to Detect Starfish Threats in the Great Barrier Reef
Utilizing AI and machine learning, the project employs TensorFlow, Cleanvision, KerasCV, and YOLOv8 to detect harmful starfish in the Great...
Women in Tech: Interview with Anastasia Mironova, Product Designer at WhatsApp London
Interview with Anastasia Mironova: sharing her career journey, perspectives on women in tech, and insights into design leadership
Reverse Proxying — the Backbone of Microservices Architecture
Understand how reverse proxies powers almost every service that we use today from monolith to microservices. It is a vital...