~hackernoon | Bookmarks (2012)
-
Simplifying Access to Blockchain Data Across Multiple Networks
The following discussion highlights the prototype's ability to enable uniform data access across multiple blockchains, facilitating...
-
Why Real-Time Teacher Feedback is Key to Student Success in Computer Science Classes
Desk crits, adapted for CS1, provide informal, personalized feedback to students as they solve problems, helping...
-
How Douwe Faasen Is Reinventing Data Infrastructure: Unveiling the Future of Data Availability
Discover groundbreaking insights from blockchain innovator Douwe Faasen in this exclusive interview. Learn how his journey—from...
-
A Simple Guide to Blockchain Queries
This section demonstrates how the prototype application processes typical blockchain queries, with examples showing the identification...
-
Dynamic Scaffolding, Pair Programming, and a Problem Ladder Walk Into a CS1 Class...
The study adapts Problem-Solving Studio (PSS) with pair programming, using dynamic scaffolding and a "problem ladder"...
-
Ethical Hackers Reveal How to Break Into Any Mobile Device (Legally!)
Mobile pentesting is about finding creative ways to break into an app. It’s different from standard...
-
The Impact of Pair Programming on Computer Science Education
This literature review highlights the benefits and challenges of pair programming in education, emphasizing its positive...
-
Can We Simplify Blockchain Data with a Cross-Chain Query System?
This section demonstrates the feasibility of implementing the proposed cross-chain query language through a prototype application....
-
The HackerNoon Newsletter: Surviving the Google SERP Data Crisis (2/2/2025)
How are you, hacker? 🪐 What’s happening in tech today, February 2, 2025? The HackerNoon Newsletter...
-
HackerNoon Decoded 2024: Celebrating Our Programming Community!
Welcome to HackerNoon Decoded—the ultimate recap of the Programming stories, writers, and trends that defined 2024!...
-
Your First Programming Language Greatly Influences How You Think About Code
Object-oriented programming, inheritance, and subtyping may have specific meanings that don't translate into other languages, depending...
-
Dissecting a Real-World Bitcoin Testnet Multisig Transaction
The appendix illustrates a real Bitcoin testnet multisig transaction, showing how the protocol ensures trustless transactions...
-
Why Multisig Might Not Be Ready for Widespread Arbitration Use
Multisig technology offers a promising, trustless solution for cross-border disputes, but it faces challenges in gaining...
-
Can Multisig Arbitration be Seen as an Autonomous Legal Order?
Bitcoin’s multisig arbitration process, despite its technological self-enforcement, cannot be viewed as an autonomous legal order...
-
An Open Source Exploit Last Year Changed How Professionals Think of Security
The xz Utils incident was a chilling example of what’s at stake.
-
How Does Multisig Authentication Differ from Traditional Arbitration?
Multisig e-awards, though self-enforcing, require authentication for legal recognition. The process varies by jurisdiction, but under...
-
My Startup Was Bleeding Cash—Here’s How I Sold It Anyway
Alex Dro sold his non-profitable startup. He shares his tips on how to sell a startup...
-
The TechBeat: Lumoz Launches SVM as a Service, Supporting the Integration of ZK and TEE Multi-Proof for SVM L2 (2/2/2025)
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...
-
What Are The Seven Hidden Triggers of Stupidity?
The Princeton Review founder Adam Robinson identified seven triggers that make us stupid. The smarter you...
-
Meet Fintopio’s Crypto Wallet
While there are many wallets in the crypto space with various jam-packed functionalities, Fintopio’s core focus...
-
The HackerNoon Newsletter: Can the Blockchain Make Traditional Courts Redundant? (2/1/2025)
How are you, hacker? 🪐 What’s happening in tech today, February 1, 2025? The HackerNoon Newsletter...
-
HackerNoon Decoded 2024: Celebrating Our Product Management Community!
Welcome to HackerNoon Decoded—the ultimate recap of the Product Management stories, writers, and trends that defined...
-
Is Raw Blockchain Data Legally Equivalent to a Written Award?
Blockchain multisig transaction data could fulfill the "in writing" requirement for arbitration awards, providing verifiable, unaltered...
-
Is It Possible for an Arbitrator To Sign an Arbitral Award Digitally?
Blockchain-based electronic signatures could be legally valid for arbitration awards. This paper examines the role of...