~hackernoon | Bookmarks (1962)
-
SQL Window Functions: A Quick Review With Examples
Window functions are a powerful feature in SQL used to perform calculations across a set of...
-
A Smidge of Behavioral Science at the End of the Year
The last newsletter of 2024. My article on "Smart Green Nudging" has been published on Medium....
-
The HackerNoon Newsletter: GPS Is Broken, And Its Holding Tech Back (1/5/2025)
How are you, hacker? 🪐 What’s happening in tech today, January 5, 2025? The HackerNoon Newsletter...
-
Agile: How to Write User Stories for Beginners
A user story is a small note that describes the user, what they need, and why...
-
The TechBeat: Unpacking The Starknet Bolt Upgrade (1/5/2025)
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...
-
How We Implemented a Chatbot Into Our LLM
To implement a chatbot, we let the model generate a response by concatenating the chatting history...
-
The HackerNoon Newsletter: Adaptive Lighting - An Example of HACS (1/4/2025)
How are you, hacker? 🪐 What’s happening in tech today, January 4, 2025? The HackerNoon Newsletter...
-
How Effective is vLLM When a Prefix Is Thrown Into the Mix?
We explore the effectiveness of vLLM for the case a prefix is shared among different input...
-
The TechBeat: The Crypto Industry is Overlooking a Critical Factor in Ensuring Its Success (1/4/2025)
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...
-
The Trust and Safety Dilemma: Balancing AI and Humans in Content Moderation
The debate between manual and automated moderation has sparked intense discussion. Essential factors such as cost-effectiveness,...
-
Unleash the Power of Interactive Data: Python & Plotly
Data visualization is crucial for uncovering hidden patterns and insights. This guide introduces Plotly, a Python...
-
Probabilistic Predictions in Classification - Evaluating Quality
Binary classification is one of the most common machine learning tasks. In practice, the goal of...
-
Should You Remain Bullish on Bitcoin?
Bitcoin recently hit an all-time high of $100,000, fueled by factors like Bitcoin ETF approvals, the...
-
How One Vietnamese Community Depends on YouTube for News
Sonia Ohlala is a YouTuber who broadcasts Vietnamese news in her videos. She often focuses on...
-
5 Open-source and Free Operating Systems to Donate via Kivach
An operating system (OS) is the main software on a computer or mobile device that manages...
-
ZeroShape: Data Curation Details - Synthetic Training Dataset Generation and More
In this section, we describe our data generation procedure for training and rendering the object scans...
-
ZeroShape: The Inference on AI-Generated Images
To test the out-of-domain generalization ability, we generate images of imaginary objects as the input to...
-
ZeroShape: Additional Qualitative Comparisons You Should Know About
We show additional qualitative results on OmniObject3D, Ocrtoc3D and Pix3D in Fig. 7, Fig. 8 and...
-
The TechBeat: Unpacking The Starknet Bolt Upgrade (1/3/2025)
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...
-
Life360 Is Being Sued for Selling Location Data: What You Need to Know
A proposed class-action lawsuit has been filed against the maker of family-tracking app Life360, alleging it...
-
The Ultimate Cloud Cost Optimization Guide for 2025
Cloud computing has revolutionized the way companies scale and innovate. But cost control is one hurdle....
-
AI’s Boom vs. Energy Crisis Community: What the 2030 Apocalypse Could Look Like
The world is at the peak of a generative AI revolution. As adoption spreads and models...
-
How to Secure Coroutines and WebFlux Reactive Applications With Prometheus, Grafana, and InfluxDB
Spring and Kotlin Coroutines can be used together to make applications as reactive as possible. In...