Articles

Read our latest articles and stories
Social Media Algorithms

The “Hidden Hand“ Behind Social Media Algorithms and How it Works

How to make scalable and efficient social media scoring algorithm that makes sense to the end user.

Meet AIN’s Founder and CTO – Branislav Đalić

This story is a part of Hacker Noon's Meet the Writer series of interviews.

Raspberry Pi In Production

Let's go through some basic security settings to make your project and Raspberry Pi production ready.

How I Built a Complete P2P RSS Podcast App in a Single HTML File

A single-page app that uses RSS, P2P communication and decentralized storage to serve as a podcast player.

WiFi Beaconing: A Way to Save Lives via Beacon Flooding

What is WiFi beaconing exactly and why does it matter for the purpose of this article?

Technical Debt and the Obfuscation of Truth

Our world is in a clerical mess. Growing technical debt is leading us into a Kafkaesque future.

Spytech: The Simple Guide to Secret Communication

A simple way to make a secret channel for communication by hiding data in plain sight.

11 Commandments Of Smart Contract Design

Choosing the right design pattern when writing smart contracts in Solidity (and sticking to it!).

How to Make a Poor Man’s EEG

It must be cheap, available in terms of hardware, and user friendly - no brain surgery required!
1 2