Home
Projects
Services
About
Articles
Contact
Home
Projects
Services
About
Articles
Contact
Blog Full Left Sidebar
Caption aligned here
/
February 24, 2022
/
Blog
The “Hidden Hand“ Behind Social Media Algorithms and How it Works
How to make scalable and efficient social media scoring algorithm that makes sense to the end user.
Branislav Đalić
algorithm
,
social-media
,
social-media-ranking
,
web-monetization
No comments
/
October 4, 2021
/
Blog
How I Made My First AI YouTuber
The age of AI powered video content is coming.
Branislav Đalić
artificial-intelligence
,
future-of-AI
,
gpt-3
,
youtube
No comments
/
September 20, 2021
/
Blog
Meet AIN’s Founder and CTO – Branislav Đalić
This story is a part of Hacker Noon's Meet the Writer series of interviews.
Svetlana Kašić
cto
,
hackernoon
,
startup
,
tech-writers
No comments
/
August 27, 2021
/
Blog
Raspberry Pi In Production
Let's go through some basic security settings to make your project and Raspberry Pi production ready.
Branislav Đalić
cloudflare
,
DDNS
,
information-security
,
raspberry-pi
No comments
/
August 12, 2021
/
Blog
Using JavaScript to Identify Unique Typing Styles
Let's use JavaScript to verify users' typing style in a browser.
Branislav Đalić
kernel-density-estimator
,
keystroke-dynamics
,
machine-learning
,
typing-biometrics
,
user-verification
No comments
1
2
3
Recent Articles
The “Hidden Hand“ Behind Social Media Algorithms and How it Works
February 24, 2022
Branislav Đalić
How I Made My First AI YouTuber
October 4, 2021
Branislav Đalić
Meet AIN’s Founder and CTO – Branislav Đalić
September 20, 2021
Svetlana Kašić
Text Widget
Nulla vitae elit libero, a pharetra augue. Nulla vitae elit libero, a pharetra augue. Nulla vitae elit libero, a pharetra augue. Donec sed odio dui. Etiam porta sem malesuada.
Tag Cloud
algorithm
android-app-development
appinventor
artificial-intelligence
beacon-flooding
blockchain
bureaucracy
cloudflare
crypto
DDNS
design-patterns
eeg
elon-musk
ethereum
future-of-AI
gpt-3
hackernoon
hiding-data
information-security
kernel-density-estimator
keystroke-dynamics
machine-learning
MVP
neuralink
nfc
p2p
raspberry-pi
rss
secret-communication
smart-contract
social-media
social-media-ranking
software-development
solidity
spying
startup
steganography
tech-writers
technical-debt
trustware
typing-biometrics
user-verification
web-monetization
wifi-hacking
youtube
Post Category
Blog