~hackernoon | Bookmarks (1931)
-
My Journey as a Smart Contract Security Researcher: First Steps with Cyfrin Updraft
My journey with Cyfrin Updraft has already taught me invaluable lessons about what it truly means...
-
The HackerNoon Newsletter: Could Trump Make Crypto Great Again? (11/8/2024)
How are you, hacker? đȘ Whatâs happening in tech today, November 8, 2024? The HackerNoon Newsletter...
-
How Logical Clocks Keep Distributed Systems in Sync
Distributed systems face challenges in synchronizing time and ordering events consistently. Logical clocks, introduced by Lamport,...
-
Money vs Currency
Money is just a tool for trading and acts as a container to store your economic...
-
How Fintech Is Driving Financial Inclusion Among Small Enterprises
Fintech lending and fintech banks are booming. Consumers, merchants, and entrepreneurs are leveraging digitally-enabled financial services...
-
Solutions for Failing to Create Tenants in Apache DolphinScheduler
However, sometimes, we may encounter an issue with creating tenants that fails. This article analyzes common...
-
The Evolution of Apache SeaTunnelâs Technical Architecture and Its Applications in the AI Field
With the growing demand for data integration, Apache SeaTunnel, as a new generation of data synchronization...
-
My Teams Hates Retros. What Should I Do?
â Team experience (TX) relies mostly on company culture and policies; â Most teams are unable...
-
-
MLOps With Databricks and Spark - Part 1
In this blogpost series we will dive into building an end-to-end MLOps using Databricks and Spark...
-
Solanaâs Surge: Why is It Set to Lead the Blockchain Industry?
Solana keeps improving its position as a major force in the blockchain world, leaving many of...
-
View Life as a Puzzle to Solve Complex Problems
For some people, assembling a puzzle can be an enjoyable activity. However, looking deeper into this,...
-
Explanation of ERC-6900: Modular Smart Contract Accounts and Plugins
ERC-6900 brings Modular Smart Contract Accounts to Ethereum, expanding on ERC-4337. It enables developers to add...
-
3 Real-World Examples of Why Companies Need Better Email Authentication
DKIM, SPF, and DMARC are valid and vital tools that help you protect your brand, reputation,...
-
Stream Processing - Windows
Unbounded data refers to continuous streams of data generated from sources that require real-time or near-real-time...
-
Stream Processing - Concepts
Streaming systems are capable of producing correct, consistent, and repeatable results, contrary to the misconception that...
-
Event Time Processing with Flink and Beam - Power of Real time Analytics
Apache Flink provides a powerful engine to process data in real time. If we can answer...
-
Writing Data With COBOL
My experience learning COBOL. In this tutorial, I'll show you how to add indexed information to...
-
The TechBeat: Introducing Rootstock Genesis Countdown: User Guide (11/8/2024)
How are you, hacker? đȘWant to know what's trending right now?: The Techbeat by HackerNoon has...
-
Transforming Legacy with Domain-Driven Design, III: Tactic
DDD doesnât prescribe a specific architectural approach, but certain existing solutions effectively help achieve the tactical...
-
Could Trump Make Crypto Great Again?
A Trump victory could reshape cryptoâs future, with potential pro-crypto policies, Elon Muskâs influence, a national...
-
The Bitcoin Blockchain in Five Hundred Years is Reputation DNA
Reputation networks on Blockchain will evolve into Reputation DNA. Because blockchain is a self-correcting system running...
-
Qtum Bridge is Live on Testnet with Incentive Campaign
Qtum's team is testing a bridge to the Ethereum blockchain through an incentivized community testnet program...
-
Introduction to Cargo and cargo.toml
When working with Rust, Cargo is your go-to tool for managing dependencies, building, and running your...