For My Dad, I Automated Bulk WhatsApp Messaging using Python - Here's How

By Divesh 
So, this Whatsapp just irritates my dad.

Read the full story

 

The 4-Hour a Month Crypto Investor: How to Make Money When You’re Short on Time

By Misha 
*This article contains some referral links

Read the full story

 

Protecting the Japanese Elderly from Scams Using AI

By Silkdrive 
If I believed all emails that end up in my spam folder, I would be a billionaire: a Nigerian prince promising to reward me in tenfold if I just help him out with a small amount now.

Read the full story

 

"The Abandonment of Clean Algos is the Suicide of Mainstream Social Media" - Minds CEO Bill Ottman

By David Smooke 
Bill Ottman is the co-creator and CEO of Minds, a free and open source social network with crypto rewards. They continue to make waves as an alternative to the incumbent social network business model of surveillance capitalism. Bill has also been a guest on the Joe Rogan podcast. Today, he kindly took the time to answer some questions for Hacker Noon. 

Read the full story

 

How to Remove Gender Bias in Machine Learning Models: NLP and Word Embeddings

By Jay Gupta 
Most word embeddings used are glaringly sexist, let us look at some ways to de-bias such embeddings.

Read the full story

 

Check Out Your Competitors’ Page Views and Benchmark Against Them - A How-To Guide

By SimilarWeb 
A high number of page views isn’t necessarily an indicator of high user engagement or potential revenue from your website or app. But, that doesn’t mean page views are insignificant. Monitoring and working with this key metric may even be more valuable than you think. The trick is to look at it in the right context.  

Read the full story

 

11 Ways Your Competitors Can Hit You With Negative SEO Attacks And How To Bolster Your Defenses

By Murrough Foley 
Negative SEO is nothing new. As long as there have been ways to improve your position in the organic results, there have been malicious actors who target their competition with negative search engine optimisation techniques.

Read the full story

 

How To Rename Your Git Repositories From "Master" to "Main"

By Tobias 
Until recently, almost every Git repository had a default branch named "master". But thankfully, as part of a movement to make the tech industry more inclusive and open, many software teams and open source projects are moving away from this unhealthy naming.

Read the full story

 

Main Security Concepts and the Importance of Data Privacy

By Clo from This Too Shall Grow 
Trigger warning: authoritarianism, state surveillance, the Holocaust. If you want to avoid these topics, please jump to the last paragraph of this introduction, starting with ‘Enough about the depressing stuff.’

Read the full story

 

How To Become Better At Marketing - Pioneering Principles to Post-Modern Strategies

By Mark 
This article consists of 5 sections:

Read the full story

 

Building A Test Runner in Jest - A How-To Guide

By Ruairidh Wynne-McHardy 
I use Jest nearly every day when working, and it's a fantastic tool. It lets me ship my code with confidence, knowing that I have produced something which works as intended.

Read the full story

 

Could Fintech Play A Role In Undermining Systemic Racism Or Will It Exacerbate It?

By Tom Matsuda 
Fintech is often proclaimed as the great leveller. The WEF proclaimed it as financially key in uplifting Muslim businesswomen and fintech lending algorithms have been found to discriminate less than traditional in-person lenders.

Read the full story

 

Here's How I Built An ETH Wallet On A Cheap NFC sticker

By Branislav Đalić 
Story of how I tried to become a cyborg, but with a geeky twist

Read the full story

 

The Rise and Fall of a Tribal Cryptocurrency

By Mina Down 
MazaCoin is a cryptocurrency that tried to bring together two very different communities: cryptocurrency maximalists and a North American indigenous tribe looking to assert its sovereignty.

Read the full story

 

Leveraging Google's Pinject to Write Loosely Coupled Python Code

By Ganesh Iyer 
Dependency Injection(DI) is a set of software design principles that enable engineers to develop loosely coupled code. This stack overflow post is the best ELI5 description of DI:

Read the full story

 

Revealing The Secrets of Top Software Engineers

By Will Goto 
One of the largest misconceptions about succeeding as a software engineer is that people think if they simply work hard, they will become successful and will receive the recognition they deserve. They couldn’t be further from the truth.

Read the full story

 

How Javascript Was Created and Why The History Behind It Is Important

By Manik 
Having a humble beginning of starting as a language that was intended to handle browser validations to a full-blown programming language that powers a lot of desktop applications as well, JavaScript has traveled a long journey.

Read the full story

 

The Impact of AI Transformers on the Customer Experience

By Federico Cesconi 
I have spent the last few weeks understanding the impact of a great revolution in the world of Artificial Intelligence and NLP on the customer experience. Not from a purely technical point of view, but trying to estimate the competitive advantage that this new approach can generate. We are facing yet another disruptive innovation, and it can bring significant advantages, let's try to find out which ones.

Read the full story

 

How to Optimize Videos for Youtube's Machine Learning Algorithms

By Keshawkunal 
Machine Learning still comes under the domain of unchartered territories, and we are constantly learning the applications of this modern-day technology. It has enabled computer systems to learn progressively and analyze patterns in data to adjust their actions automatically.

Read the full story

 

XinFin Hybrid Blockchain vs EOS.IO: The Battle of XDPoS vs DPoS

By XinFin_Hybrid_Blockchain 
Proof-of-Stake (PoS) has been rising as one of the sexiest techniques for replacing Proof-of-Work (PoW) currently used in mainstream blockchain technologies such as Ethereum and Bitcoin. The objectives of PoS-based blockchains such as EOS.IO and XinFin Hybrid Blockchain are not only to eliminate the PoW-related electricity consumption but also to provide a scalable solution to tackle the transaction processing performance problem in Ethereum and Bitcoin. The latter can only process around 10–15 transactions per second, which is not comparable to Visa and MasterCard.

Read the full story

 

The Sectors Most at Risk from Remote Work and How to Secure Them

By Isaac Kohen  
Making the transition to a work from home arrangement has been a heavy lift for a lot of organizations. 

Read the full story

 

Try These Steps for Increasing Privacy and Security on Windows 10

By Elina Watson 
Note: Some versions of Windows 10 may not show all the following settings.

Read the full story

 

These are the Top 5 Browsers for Privacy and Security

By Apu Chakraborty 
Anonymity on the internet has been in a steady state of decline. In the interest of reversing that trend, this is a list of the top five browsers for privacy and security. While it should be noted that nothing published on the internet is perfectly private or secure, these are the browsers that will do the most to get you close.

Read the full story

 

How We Got the First 100 Customers for Our Tech Startup

By Daniel Ndukwu 
It’s been said that getting your first ten customers is hard but getting your first 100 customers is the hardest. It’s also the milestone that many startups never get to because of the competition, their skillsets, and so many other factors.

Read the full story

 

Bring your idea to life on a
.TECH Domain

 
Twitter
Facebook
Link
Spotify
YouTube
Pinterest
Reddit
GitHub
RSS
Email
SPONSOR THIS NEWSLETTER 🚀

Copyright © 2020 Hacker Noon, All rights reserved.
You are receiving this email because you opted in at our website hackernoon.com.

Our mailing address is:
Hacker Noon
PO Box 2206
Edwards, CO 81632-2206

Add us to your address book


unsubscribe