By Natasha Nel I sat down with Sarah Evans—tech industry PR legend and strategic communications startup founder—to talk all things branding and influence: from personal to B2B. You can watch the Youtube version of this podcast right here in this post, or grab the audio-only on Spotify, or over at podcast.hackernoon.com.Read the full story By Vinita Bansal We humans crave a perfectly ordered world though the chances of something going as intended is fairly rare. When there’s more than one human being involved in the equation, the predictability goes for a further toss. What do we do when things do not turn out as intended? Instead of being curious and trying to learn from the situation, our mind assumes the worst possibility. Read the full story By Vince Tabora It is a warm and sunny afternoon on a weekend. This is a good time to head to a cafe to chill for a bit with a coffee and pastry. It is also perfect for some web surfing using the free Wi-Fi service. The next thing you would need to know is the Wi-Fi access point (i.e. hotspot) and password. Now you are all set and connect to the Internet. For the average user this is fine, but for cybersecurity experts there is a risk to using free Wi-Fi services.Read the full story By Sebastian Gil Rodriguez When creating any software, it is almost inevitable to spend a big part of your development time researching, and many times this involves looking for syntax you don't remember, or for finding out how other people have approached the same problem you are trying to solve.Read the full story By Rupesh Such a cool-sounding term, I had to find out its meaning and purpose. So here is the story.Read the full story By Michael Usiagwu Around the middle of March, news filtered out of a cyberattack that hit the US Health and Human Services Department. Amid battling a pandemic, the HHS cyberinfrastructure was overloaded but the HHS Secretary, Alex Azar, claimed that "we had no penetration into our networks, we had no degradation of the functioning of our networks." Read the full story By Jake Dowie I know, 21 is a lot of keys. Software development is complex, don't let anyone tell you different. I imagine some of these points will resonate with you and hopefully some will be new and enlightening.Read the full story By Patrick Murray I got a text from my Nanny on a Thursday. "Can I call you?" Read the full story By Dane Lyons The traditional comment box at the end of a blog post is not a sufficient way to facilitate reader and writer communication. It falls short in a number of ways:Read the full story |
|