~hackernoon | Bookmarks (1972)
-
Code Smell 246 - Modeling Expiration Dates
In many systems, the expiry date of a credit card is often represented by simply using...
-
Meet the Writer: HackerNoon's Contributor Boris Bugor, Senior iOS Developer
Boris has been working as an iOS Developer for more than five years. His latest article...
-
The 30-Day .NET Challenge - Day 21: StringComparison
The article demonstrates the importance of using StringComparison options for efficient string comparison in.NET. How you...
-
The 30-Day .NET Challenge - Day 20: Task vs. ValueTask
Heap allocations aren’t entirely bad but when an object is allocated on a heap it contributes...
-
3 Examples of Regular Expressions in C# For Beginners
Discover straightforward examples of regular expressions in C# for beginners, focusing on pattern matching and text...
-
Google Analytics 4 (GA4) for Beginners—Part 2: Mastering Reports and User Interface Navigation
For new or experienced users, this guide takes you through Google Analytics 4. It explains its...
-
AI and the Problem of “Knowledge Collapse”
AI and the problem of "knowledge collapse" - The article delves into the concept of "knowledge...
-
The 30-Day .NET Challenge—Day 19: Stack vs. Heap Allocation
The article demonstrates the idea of memory allocations to be used for vibrant and high-performance applications....
-
-
EV Adoption in India: Is It Actually a Good Thing?
EV sales in 2023 surpassed 1.5 million, a whopping 50% increase over the previous year. With...
-
Cracking System Design Interviews: Answers to Top 25 Interview Questions for Software Developers
This comprehensive guide covers 25 crucial system design interview questions and solutions, offering insights into scalability,...
-
Streamlining LLM Implementation: How to Enhance Specific Business Solutions with RAG
The article explores using RAG to improve LLM performance with LlamaIndex and LangChain. It covers setting...
-
7 Tips for Grinding Leetcode
Leetcode is famous for being a perfect platform for practicing coding problems and to master coding...
-
Crypto Nodes Explained: Uses, Setup, and Why You Need One
Cryptocurrency nodes, whether full or light, play crucial roles in decentralized networks by verifying transactions, maintaining...
-
Exponential.fi: Revolutionizing DeFi Accessibility for Crypto Investors
Discover how Exponential.fi, founded by Mehdi Lebbar, is transforming DeFi investments, making it straightforward and secure...
-
The 30-Day .NET Challenge - Day 18: AggressiveInlining Attribute
One of the techniques to improve application performance involves the use of the AggressiveInlining attribute. It...
-
A Beginner's Guide to Regex Options in C#
Discover the capabilities of regular expressions in C#, from pattern matching to text manipulation. Explore various...
-
Get An 87% Boost to Collection Initializer Performance in C#
This article delves into the performance of collection initializers in C#, comparing various initialization methods using...
-
Soft Skills: The X-Factor That Opens Every Door
Soft skills are the X-factor in career success, fostering empathy, communication, and adaptability. They're essential for...
-
How to Advertise to Your Target Audience without Creeping Them Out
Presenting you HackerNoon’s Targeted Ads by content relevancy - where you target the audience interested in content...
-
Why Is Upwork Suspending Six-Figure Clients?
In three weeks Upwork has suspended eight six-figure long-term clients, and (very likely) still counting. Each...
-
Orchestrating the Code Maze: Strategies for Effective Collaboration Amongst Development Teams
Poor management of several development teams can lead to duplicated work, inefficient use of resources, and...