~hackernoon | Bookmarks (1900)
-
How Internal Developer Platforms Are Empowering Developers?
Internal Developer Platforms (IDPs) represent a new approach to how developers work. They offer a unified,...
-
Cybersecurity basics: security controls
This article discusses cybersecurity fundamentals and in particular describes security controls.
-
13 Hacks for Managing Anxiety (If You Have None, Entrepreneurs, You're Doing Something WRONG)
Anxiety is the fear of striking up a conversation with someone you don't know. In Medellin,...
-
Solana vs Ethereum: The David vs Goliath Battle for Smart-Contract Supremacy
Solana is closing the gap with strong user growth, robust DeFi activities, and significant momentum in...
-
How Mobile Weather Apps Help You Survive the Hurricane Season
Mobile weather apps have evolved a lot, raising awareness and allowing people to plan their time...
-
Get Out of That Post-Summer Slump With a Template!
The HackerNoon team has a smorgasbord of writing templates to get you started. The team is...
-
Say Goodbye to AI Hallucinations: A Simple Method to Improving the Accuracy of Your RAG System
This article delves into how to improve the accuracy and performance of AI assistants, overcoming the...
-
How Video Consumption Has Impacted the World in the Digital Age
Video content has emerged as a dominant force, reshaping how consumers interact with information and entertainment....
-
Subsquid Raises $17M To Build A New Era for Blockchain Data Indexing
Explore how Subsquid is transforming blockchain data indexing with its $17M-backed SQD token and innovative "modular...
-
Educational Byte: How to exchange GBYTEs for USDT on Biconomy?
The main currency of the Obyte ecosystem, GBYTE, has a nice set of liquidity options for...
-
BANANA's 8M Users in 4 Weeks — Inside CARV's TON Gaming Success Story
Discover how CARV is revolutionizing blockchain gaming with its data-centric approach, empowering 9.5M players across 900+...
-
Why I Use RTK Query for API Calls in React
The RTK Query part of the Redux Essentials tutorial is phenomenal, but since it’s part of...
-
GoLang: Working with Inconsistent Data Types in DynamoDB (Part 1) — Manual Conversion
Go is a strongly-typed, performant language designed to accomplish 80 percent of the work. It can...
-
The Critical Role of Data Annotation in Shaping the Future of Generative AI
Explore how data annotation is crucial to generative AI success. Learn about tools, strategies, & best...
-
Mapping IT System Capabilities: The Key to Unlocking Valuable Business Data
Understanding the role of an IT system within an organizational context is key to unlocking the...
-
Leveraging Blockchain And AI To Eliminate Fake Reviews
Up to 30% of online reviews are inauthentic, leading to widespread distrust among consumers. Intense competition...
-
Kafka Message Testing: How to Write Integration Tests
This article offers an approach to writing integration tests for Kafka-based applications that focuses on interaction...
-
Architectural Principles of Error Handling in Ruby
Software developers write tons of code every day, pack it into releases, and deploy it to...
-
Sooo! I Published My First Chrome Extension Font Tester - Here's How It Went.
I built a Chrome extension to help me choose fonts; I now pass on the wisdom...
-
9 Lessons I Learnt as the Founding Marketer of a Tech Startup
Navigating the startup world can be challenging, yet quite a rewarding journey. I would like to...
-
RAG Predictive Coding for AI Alignment Against Prompt Injections and Jailbreaks
What are all the combinations of successful jailbreaks and prompt injection attacks against AI chabots that...