~hackernoon | Bookmarks (1929)
-
Understanding NFT Transaction Networks Through Analysis and Prediction
This paper analyzes NFT transaction networks on Ethereum, focusing on growth, influential nodes, and market trends....
-
Graph Analysis and Bubble Prediction Are Key to Understanding NFT Networks
This section reviews prior work on blockchain graph analysis, focusing on ERC-20 and ERC-721 token networks...
-
NFT Ownership Is Decentralized and Follows a Zipfian Distribution
This methodology section explores NFT ownership trends and decentralized dynamics, revealing that most owners hold few...
-
A Single Point of Access or Chaos — Unlocking Non-Blocking API Gateways
Spring Cloud Gateway is a modern, non-blocking API gateway that offers significant improvements over its predecessor,...
-
Solve Concurrency Challenges with Spring's @Transactional Annotation
The article discusses the effective use of the @Transactional annotation in Spring, focusing on solving concurrency...
-
DMCC and REIT Development Unveil Landmark Crypto Tower In JLT
DMCC and REIT Development announce construction of 17-storey Crypto Tower. Tower to support DMCC’s rapidly growing...
-
The HackerNoon Newsletter: To Sell Software in 2025, Devs Must Think Like Marketers (1/16/2025)
How are you, hacker? 🪐 What’s happening in tech today, January 16, 2025? The HackerNoon Newsletter...
-
Trump, Don’t Just Lock Away Your 1 Million Bitcoin—Build a Tech Metropolis Instead
Bitcoin has good SoV and MoE functions. But it needs a semblance of intrinsic value. To...
-
HackerNoon Decoded: The Top 10 Countries Where HackerNoon Is the Most Active
1. United States 2. India 3. China 4. United Kingdom 5. Japan 6. Germany 7. Brazil...
-
Maths Education is Broken—Here’s How We Can Fix It
Dr Sabine’s new video is a logical tome, and I couldn’t quite grasp it. Meanwhile, I...
-
Meet Super Duper Studios, Bokonzi, & Kuenha: HackerNoon Startups of The Week
Welcome to HackerNoon Startups of the Week! Each week, the HackerNoon team showcases a list of...
-
To Sell Software in 2025, Devs Must Think Like Marketers
5 years ago I sold my WordPress plugin business to Automattic. Back then the landscape of...
-
How to Build a GUI-Based Currency Converter App in Python
This guide walks you through creating a Python-based currency converter app with a GUI using Tkinter....
-
Code Smell 286 - Parent-Child Method Overlaps
Private method collisions in parent-child classes can lead to bugs and code smells. Avoid this by...
-
Educational Byte: Chatbots in Obyte and What They Do
Obyte is a decentralized app that lets users control their own money. The Obyte wallet includes...
-
The TechBeat: With Gelsinger's Departure, Could Intel Be Headed Towards a Stock Surge? (1/16/2025)
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...
-
Bridging Computational Notions of Depth: Members of Deep Classes
Introducing the members of deep classes and proving that they are strongly deep.
-
Here's Proof of the Slow Growth Law and Some Unobserved Consequences
In this section, we provide a proof of the slow growth law and provide some hitherto...
-
Gennady Dmitrik: Transforming Mobile Apps with Vision and Expertise
Gennady Dmitrik is a skilled tech entrepreneur, founder of multiple startups, and a visionary developer of...
-
The HackerNoon Newsletter: Youre Overthinking It (1/15/2025)
How are you, hacker? 🪐 What’s happening in tech today, January 15, 2025? The HackerNoon Newsletter...
-
How Has Sci-fi Influenced Space Exploration? Answer Now to Win from 15,000 USDT
The Spacecoin Writing Contest by Spacecoin and HackerNoon is the perfect chance to win money by...
-
To Catalyze AI Infrastructure Collision: Open Launches #WEBisOpen Point System 🚀
Open unveils the #WEBisOpen Point System, rewarding users with $OPEN points for ecosystem engagement. From DeFi...
-
Aembit Announces Speaker Lineup For The Inaugural NHIcon
NHIcon 2025 will provide technical insights and practical guidance to address the challenges of securing non-human...
-
Sweet Security Unveils Patent-Pending LLM-Powered Detection Engine
Sweet Security launches patent-pending Large Language Model (LLM) powered cloud detection engine. Engine can identify previously...