Financial inclusion – enabling credit for immigrants from 150+ countries

We started Stilt ~3 years ago from our apartment in San Francisco. Both Priyank and I were on visas with full-time jobs while spending… | Continue reading


@hackernoon.com | 6 years ago

Watches, Mattresses, and “Meh” Multiples

In the last week two D2C product brands were acquired for $100M+ and the typical VC playbook could have killed them both. | Continue reading


@hackernoon.com | 6 years ago

51 evergreen tech stories from Hacker Noon

Meet our weekly sponsor, mabl. Powerful test automation integrated with your delivery pipeline. Create your free mabl account today. | Continue reading


@hackernoon.com | 6 years ago

Investing in Crypto Is as Easy as 1, 2, 3

Interested in getting started with crypto? | Continue reading


@hackernoon.com | 6 years ago

Marketing Your Side Project on 0$

How I Marketed My Side Project, While Making 550€/month at a 40h/week Job | Continue reading


@hackernoon.com | 6 years ago

Google is Using You

If you've been on the internet the last decade, you've been doing volunteer work for Google. | Continue reading


@hackernoon.com | 6 years ago

Security Tokens – What Are My Rights?

San Francisco, CAAugust 20th, 2018 | Continue reading


@hackernoon.com | 6 years ago

InfoSec Career Paths vs. Programming Skills

I’ve recently was asked for a numerous time — “Is being a great developer vital when choosing information security as a professional… | Continue reading


@hackernoon.com | 6 years ago

Should I use Promises or Async-Await

I recently read a medium post where the author claimed that using async-await is better than using promises. While this might hold good in… | Continue reading


@hackernoon.com | 6 years ago

Cyber Crimes and Penalties: A State-By-State List

In wake of the Trump Administration's decision to revoke PPD-20, lets review the current landscape of domestic cyber abuse and the… | Continue reading


@hackernoon.com | 6 years ago

Security Token 2.0 Protocols: Debt Tokens

Security tokens might become the first type of crypto-asset to bridge the gap between established institutional investors and the crypto… | Continue reading


@hackernoon.com | 6 years ago

Why All the Excitement About Artificial Intelligence?

Nowadays it’s hard to go to any news source, social media outlet, or downtown bar without hearing the term artificial intelligence thrown… | Continue reading


@hackernoon.com | 6 years ago

Layman's Guide to AI

“The very concept of intelligence is like a stage magician’s trick. Like the concept of ‘the unexplored regions of Africa’. It disappears… | Continue reading


@hackernoon.com | 6 years ago

Why Text Processing and Sentiment Analysis in R?

A complete guide to text processing using Twitter data and R. | Continue reading


@hackernoon.com | 6 years ago

Security Token 2.0 Protocols: Debt Tokens

Security tokens might become the first type of crypto-asset to bridge the gap between established institutional investors and the crypto… | Continue reading


@hackernoon.com | 6 years ago

Venezuelan Petro: An unfortunate start for government-backed cryptoccurrencies

Venezuela economy is in crisis almost for a decade now. Things started with internal political conflicts during the presidency of Hugo… | Continue reading


@hackernoon.com | 6 years ago

Adding a pipe operator to Python

Or, “things you should never ever do in production” | Continue reading


@hackernoon.com | 6 years ago

Pre-announcing Solo: the first, open source, FIDO2 security key

I’m excited to unveil the first open source security key supporting FIDO2: Solo. | Continue reading


@hackernoon.com | 6 years ago

All That Glitters Is Not (Digital) Gold

A non-technical look at Bitcoin’s value. | Continue reading


@hackernoon.com | 6 years ago

Building Pokemon App to Evaluate the Power of Berries and Service Worker

First things first — In case you’re wondering what Berries are, Berries are small fruits that can provide HP and status condition… | Continue reading


@hackernoon.com | 6 years ago

Crypto Strategy: The Arbitrage of Time

Crypto is missing something. Not the flashy algorithms or pretentious marketing jargon. The cryptocurrency space is lacking the perception… | Continue reading


@hackernoon.com | 6 years ago

50 Big Companies That Started with Little or No Money

VC is a common denominator of the most successful tech startups, but it isn’t a prerequisite, especially at the early stage. | Continue reading


@hackernoon.com | 6 years ago

Getting Deep into EVM: How Ethereum Works Backstage

An Ultimate, In-depth Explanation of What EVM is and How EVM Works. | Continue reading


@hackernoon.com | 6 years ago

10 Great Tips to Learn Docker

Learning is not only about what but how, not only about what technical skills you should have but it’s also about how you should learn… | Continue reading


@hackernoon.com | 6 years ago

Security Gaps Found in IPsec

You’ve probably heard of Internet Protocol Security (IPsec) referred to by many as one of the most secure data encryption methods. | Continue reading


@hackernoon.com | 6 years ago

Show HN: How to hack smart contracts (Ethernaut walkthrough series)

Make a smart contract do things it didn’t want to… | Continue reading


@hackernoon.com | 6 years ago

Why disrupting design will accelerate humanity’s progress

Design is a fundamental driver of society’s advancement. The design process allows us to find solutions to increasingly complex problems… | Continue reading


@hackernoon.com | 6 years ago

When Your Organizational Structure Does Not Work…

Merging adaptability, collaboration and decentralization with a defined management structure. | Continue reading


@hackernoon.com | 6 years ago

The Density Paradox

In every aspect of today’s world, humans exist and operate inside centralized pockets of density. | Continue reading


@hackernoon.com | 6 years ago

PostgreSQL vs. MongoDB v2

Benchmarking read performance of PostgreSQL and MongoDB on same data sets | Continue reading


@hackernoon.com | 6 years ago

Service Workers

On my train journey way back home, I was amazed over the number of apps I have in my phone and that, I’ve different apps to serve my… | Continue reading


@hackernoon.com | 6 years ago

Just give me a sharp knife Google*

*(Not another Dagger rant) | Continue reading


@hackernoon.com | 6 years ago

State of Cryptocurrency Custody

This piece provides an overview of the custody landscape for cryptocurrencies including what custody is, why it is important, what custody… | Continue reading


@hackernoon.com | 6 years ago

Is Electricity a Limiting Factor to Bitcoin’s Promise?

While critics have pointed out Bitcoin’s energy consumption is bad for the planet, few have asked whether a scarcity of electricity could… | Continue reading


@hackernoon.com | 6 years ago

JavaScript Limitations in Algorithmic Competitive Programming

Last year I spent some time participating in competitive programming contests where you have to solve algorithmic problems in a limited… | Continue reading


@hackernoon.com | 6 years ago

How to learn an existing code base

Whether it’s your first day at job or a struggling to contribute to any project, it’s really important to understand and master the art of… | Continue reading


@hackernoon.com | 6 years ago

Write clean code and get rid of code smells

Code smells are a set of common signs which indicate that your code is not good enough and it needs refactoring to finally have a clean… | Continue reading


@hackernoon.com | 6 years ago

The Security Token 2.0 Stack

Last week I wrote some ideas about some blockchain protocols I believe could serve as inspiration to the next generation of security token… | Continue reading


@hackernoon.com | 6 years ago

Decentralization Will Create a Better Sharing Economy

While it seems incredible to me, the fact is that Airbnb is now ten years old. | Continue reading


@hackernoon.com | 6 years ago

The Secret Sauce of Coding

Coding is a test of will. | Continue reading


@hackernoon.com | 6 years ago

Is the Music Industry Unfair to Its Artists?

In the following viral video, Liam Gallagher groans that he is forced to make his own cup of tea because “no one buys records anymore”. | Continue reading


@hackernoon.com | 6 years ago

Checklist for Writing Highly Reusable Components in React and Vue

There are so many best practices and advanced patterns — the problem is keeping track of them and keeping them in mind as you develop new… | Continue reading


@hackernoon.com | 6 years ago

Be a Better Programmer with These 40 Mathematics Courses

The Ultimate Course and Book list to be an expert in Mathematics and Programming | Continue reading


@hackernoon.com | 6 years ago

Tutorial: How to Use Bitcoin Based Blockstack Auth in Your iOS Apps

We all know about oAuth and the sites that handle authentication of the users for us. One-click signups and login buttons increase user… | Continue reading


@hackernoon.com | 6 years ago

The Business Model of Crypto-Wallets

Wallets have always fascinated me. But crypto wallets have always particularly fascinated me since i got into crypto because they are the… | Continue reading


@hackernoon.com | 6 years ago

Tips for the often distracted developer

Tips on how to eliminate distractions and tweak your environment & time towards less frustrating and more productive deep work. | Continue reading


@hackernoon.com | 6 years ago

Transaction Agnosticism: A Path to Cryptocurrency Mass Adoption

It’s been nearly a decade since blockchain was invented with the promise of providing an alternative to the old monetary system and the… | Continue reading


@hackernoon.com | 6 years ago

The 5 Marketing Benefits of Acquisitions

Recently, the idea of “acquisitions for marketing” has fascinated me. What does this mean? It refers to situations where companies acquire… | Continue reading


@hackernoon.com | 6 years ago