Bookmarks (1326)

  • screenshot

    AI-Generated Stories for Kids: The Prose and Cons

    StoryBooks is a new app that uses AI to generate children's stories. The app uses ChatGPT,...

  • screenshot

    How to Host a Large Language Model Locally

    Large Language Models (LLMs) are a subset of artificial intelligence (AI) that are designed to understand...

  • screenshot

    Finding the Right CTO for Your Startup: Insights from a Tech Lead With 20 Years Experience

    Jozef Antony is a 20-year veteran in the software and tech business. He has worked with...

  • screenshot

    Evolution of Wasm Standards: Building the Component Model

    Over the last couple of years, we've made massive progress towards building the necessary tooling to...

  • screenshot

    How to Customize Rotate Icons in Fabric.js: A Comprehensive Guide for Programmers

    Using Fabric.js, you can create interactive and engaging graphical applications that work with HTML5 canvas. One...

  • screenshot

    All unite here in this paradise of the Bembex

    Not far from Avignon, on the right bank of the Rhône opposite the mouth of the...

  • screenshot

    "Just Fly, We’ll Handle the Rest" : Interview With Startups of the Year Nominee, Vertiports Network

    Vertiports Network has been nominated in HackerNoon's annual Startups of the Year awards in Spain Misc,...

  • screenshot

    CBDCs and Privacy: The Battle Between Control and Personal Rights

    In the US, the state of Florida has banned the use of any central bank digital...

  • screenshot

    Meet Noonies 2022 Winner Fedor Yaremenko of HackerNoon Contributor Of The Year - Kotlin

    This title signifies that I have made the correct choices in both my personal and professional...

  • screenshot

    Productivity Hacks for Busy Product Managers: Useful Apps and Hotkeys

    In this article, I’m going to share some of the productivity hacks that save time in...

  • screenshot

    Sweat the Details on Your Resume — Especially if You are a Developer or Technology Leader

    Many developers neglect the quality of their resume because they aren’t comfortable with writing. Spelling and...

  • How to Buy a Token on the Uniswap Universal Router with Python

    Creating a swap transaction for the latest Uniswap router is not as straightforward as it used...

  • screenshot

    How Secure Is BeReal?

    BeReal is meant to show users' authentic selves, as opposed to the filtered, curated content of...

  • screenshot

    4 Strategies for Providing Effective Feedback to Difficult People

    The best bosses do more than charge up people, and recruit and breed energizers. They eliminate...

  • screenshot

    Simplifying Vector Search: Part 1

    Part One of a two-part series on vector search and language processing. The first part of...

  • screenshot

    The Ledger Recovery Storm: Highlighting Web3's Consumer Consciousness Problem

    Web3 has seen immense growth over the past decade, with a lot of new projects hitting...

  • screenshot

    Efficient Log Analysis: Harnessing the Power of Regex with BindPlane OP and OpenTelemetry

    Parsing logs with regex is a valuable technique for extracting essential information from large volumes of...

  • screenshot

    2 Lessons From The Early Years Of Impact DAOs

    Impact DAOs are a new paradigm, which is not immune to mistakes. We look into the...

  • screenshot

    Exploring Obyte Use Cases: Programmable Payments, Chatbots, and Beyond - Part I

    Obyte is an open-source distributed ledger (DAG) system. DAGs can be used to pay for goods...

  • screenshot

    Streamlining QA Automation: Our Vacation Project for Test User Creation

    Social Discovery Group team developed UMT — a tool to create "history-rich" users for product testing....

  • screenshot

    Cloud Security Tops Concerns for Cybersecurity Leaders: EC-Council's C|CISO Hall of Fame Report 2023

    EC-Council, the global leader in cybersecurity education and training, released its Certified Chief Information Security Officer...

  • screenshot

    GitHub (Preview) Deployments with Google Cloud Platform: An Essential Guide

    GitHub Deployer is a tiny Node.js service that authorized with a GitHub App and interacts with...

  • screenshot

    Meet Blink Copilot: A Generative AI for Security Workflows

    Blink Copilot is the first ever generative AI for automating security and IT operations workflows. This...

  • screenshot

    The Essentials of Writing a Good Bug Report

    A good bug report can make a big difference to a developer's career. A good description...

  • screenshot

    The Role of Identity and Access Management in The Security of Your Business

    Identity and Access Management (IAM) plays a critical role in safeguarding your digital assets and ensuring...

  • screenshot

    Embark on the Pepechain Adventure: Free Bridging and On-Chain Questing Await

    The Pepechain is a state-of-the-art L2 rollup chain designed to combat the high gas fees on...

  • screenshot

    Why More Engineers Don't Mean Faster Development (And What Does)

    The clock is ticking, deadlines are looming, and the project isn't moving as fast as it...

  • screenshot

    Best Practices to Move From Subscription to Consumption Based Business

    In recent years, consumption or usage (vs subscription) based business models have proliferated in existence as...

  • screenshot

    How to Make Money with Crypto in 2023: Think Bigger

    After the crypto summer was replaced by the crypto fall, most coins tumbled by 50% and...

  • screenshot

    I Pivoted my Startup Into an AI Company and You Should Do the Same — Here's How

    I pivoted Unicorn Platform into an AI company. You should do the same. The goal of...

  • screenshot

    If the Training Data Sucks, the AI Sucks, Too

    A lot of training data f*cking sucks. I haven’t dug up the correlation between training data...

  • screenshot

    Unveiling a MySQL Bug: Inconsistent Foreign Key Constraints

    The bug is all about those pesky foreign key constraints and how they can behave inconsistently....

  • screenshot

    The Anarchosatoshi Revelations

    Satoshi created Bitcoin as a payment system that would give citizens freedom. Governments have seen it...

  • screenshot

    The Importance of Simplified and Detail-Oriented Product Information in Technical Writing

    In the world of technical writing, the ability to provide simplified and detail-oriented information about a...

  • screenshot

    Why should Web3 projects not put profit in the first place? The Essential Metrics for Success.

    The most important thing is understanding who needs your product and who will use it. Projects...

  • screenshot

    Boosting Business Sustainability Through Waste Management Technology

    The problem of waste is an increasingly severe environmental issue worldwide. Statista reports that by 2050...

  • screenshot

    TAM Mastery: Learn How to Maximize Your Market Reach Using Top Down or Bottom Up Approaches

    The Total Addressable Market (TAM) is a crucial concept for businesses of all sizes, especially for...

  • screenshot

    Touch and Sight: The Earth and The Heavens

    Everybody knows that Einstein has done something astonishing, but very few people know exactly what it is...

  • screenshot

    Instinctive Faculties: The building of the nest, the safeguard and furnished the loftiest

    The building of the nest, the safeguard of the family, furnishes the loftiest expression of the...

  • screenshot

    College, Newspaper and Books: The Next Stages of Education

    The Salvaging of Civilization, by H. G. Wells, is part of the HackerNoon Books Series. Enjoy...