Top Tech Content sent at Noon!

Join MongoDB's AI Dev Quest

Read this email in your browser

How are you, @e3e77916db?

🪐 What’s happening in tech today, June 26, 2024?

The HackerNoon Newsletter brings the HackerNoon homepage straight to your inbox. On this day, K. Benz Patented the Gasoline-Operated Motor Car in 1894, A US Navy Rocket Launch Failed to Orbit in 1958, The First Bar Code Reader in the US Was Introduced in 1974, The First Draft of the Human Genome Was Released in 2000, and we present you with these top quality stories. From Steganography: How to Hide Text in Images Using JavaScript to The Role of Data Destruction in Cybersecurity, let’s dive right in.


Sponsored Content:

Discover Institutional-Grade Wealth Management with Heron Finance

imageOnce, private credit investments were exclusive to the ultra-wealthy and institutional investors. That’s why Heron Finance built a seamless platform for any accredited U.S. investors to maximize their returns.

Heron Finance’s investment analysts line up highly collateralized deals for consistent returns. Heron Finance lowers volatility and manages risk based on how they select deals:

  • Maintaining strict criteria for filtering prospective deals, ensuring that underlying borrowers stay profitable or hold assets to secure payments
  • Vetting every deal with a rigorous analytical process designed to reduce risk
  • Partnering with other lenders to find the most creditworthy deals
  • Continuously monitoring all investments with regular borrower reporting

Don't wait to improve your investment strategy, try Heron Finance and start maximizing your return potential.

Risk disclosures: http://heronfinance.com/



The Market Today

#03 Instagram (Meta)
$510.60 +2.65%
#04 Tesla
$187.35 +1.57%
#06 ThoughtWorks
$2.74 -0.36%
#14 AirBnB
$150.91 +1.29%
#01 Bitcoin
$61617.51 +0.11%

cybersecurity

The Role of Data Destruction in Cybersecurity

TL;DR What happens to information when its no longer necessary? If youre concerned with cybersecurity, you should destroy it.

By @zacamos [ 5 Min read ]

What happens to information when it’s no longer necessary? When electronics and storage systems reach their end-of-life stage, businesses must get rid of them. While they could simply delete a device’s contents and toss it, that opens them up to cyber threats. Is data destruction more secure?..

Read More

tech-companies

Meet Brave: HackerNoon Company of the Week

TL;DR This week, HackerNoon features Brave, a provider of a suite of internet privacy tools.

By @companyoftheweek [ 2 Min read ]

Welcome to another Company of the Week feature! Every week, we feature an awesome tech brand from our tech company database, making their evergreen mark on the internet. This unique HackerNoon database ranks S&P 500 companies and top startups of the year alike.

That's all this week, folks!..

Read More

programming

Steganography: How to Hide Text in Images Using JavaScript

TL;DR Steganography is a method of hiding secret messages in another, non-secret file. This article describes how to implement such an encoding engine using JS.

By @andriiromasiun [ 9 Min read ]

Steganography can also be extremely useful in many other cases, for example, it can be a good alternative to watermarking in sensitive documents to protect them against leakage.

Convert "Hello" text to binary.

Apply modified image bytes to the image itself...

Read More

media

How Advertisers Use Placement-Based Targeting on Childrens Videos

TL;DR Discover how advertisers leverage placement-based targeting on YouTubes children-focused videos.

By @webtwo [ 14 Min read ]

Authors:

(1) Tinhinane Medjkoune, Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG France;

(2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris France;

(3) Juliette Senechal, Université de Lille, CRDP, DReDIS-IRJS France.

Abstract and Introduction

Background

Legislation on Advertising to Children

Limitations..

Read More

Featured Jobs:

ASML: Senior Software Engineer

G-Research: AWS Cloud Engineer (FinOps)

Navy Federal Credit Union: Product Manager

Explore thousands of tech jobs on the HackerNoon Job Board.


On This Day

K. Benz Patented the Gasoline-Operated Motor Car

On June 26, 1894, German engineer Karl Benz was granted a patent for his invention of the gasoline-operated motor car. This was a groundbreaking moment in the history of transportation, as it paved the way for the development of the modern automobile. Benz had been working on the design of the...

Poll Of the Week

Will Netflix's New Password Sharing Crackdown Lead to Profit?

As most of us are painstakingly aware, gone are the days of sharing your friend's or family's Netflix account! Do you think this will lead to growth for Netflix or doom in an increasingly saturated streaming market?

23% Yes. Their decision makes sense from a business perspective.

8% Yes. Users who borrow other's accounts are essentially stealing.

44% No. The market is so saturated that users can find another platform that allows password sharing.

16% OF COURSE NOT. THIS IS CORPORATE GREED AT ITS FINEST

8% Netflix? I still rent from Blockbuster.

🧑‍💻 What happened in your world this week?

It's been said that writing can help consolidate technical knowledge, establish credibility, and contribute to emerging community standards. Feeling stuck? We got you covered ⬇️⬇️⬇️

Click Here to Be Interviewed on HackerNoon

We hope you enjoy this 30 minutes worth of free reading material. Feel free to forward this email to a nerdy friend who'll love you for it.

See you on Planet Internet! With love,

The HackerNoon Team ✌️

Want to get different tech stories?


Optimize which tags you're subscribed to via our Tech Brief

HackerNoon, PO Box 2206, Edwards CO 81632

Unsubscribe