How are you, @e3e77916db? 🪐 What's happening in tech this week: The Noonification by HackerNoon has got you covered with fresh content from our top 5 stories of the day, every day at noon your local time! Set email preference here. View other stories also published on this day throughout HackerNoon history. |
|
By @sammynathaniels [ 11 Min read ] A time is coming when your thoughts will be the only activity you need to get things done. Have you ever been so caught up with work, you don't want to move a muscle? You are not willing to use your voice because you feel the ideas will escape once you do. So, what do you do when you suddenly wish your favorite songs were playing at that moment, but you feel too lazy to pick up your phone or call Siri's attention to turn on your playlist? If only your thoughts could make the orders, right? Here, you are thinking, "Siri, play me 'Easy on Me' by Adele" and seconds later the sound fills your workspace. Then you think, "Nope, too low. Siri, increase the volume to 10", and the volume gets adjusted to suit what’s on your mind perfectly... |
Whats Inside Play to Earn TL;DR Deep Dive into Blockchain (EVM), NFTs, NFT Metadata Standards, Game Economies, Authorization, and How We Can Incorporate NFTs into Gaming. Read More. |
By @systerr [ 17 Min read ] Hi there! Let's explore play-to-earn games a bit. We'll discuss how to create one and incorporate NFTs into it. This article will focus solely on the blockchain mechanics and won't delve into game development. I'll aim to explain everything using simple language with explanations of all the essential parts. So, let's get started! I've been immersed in blockchain development since 2018, and during that time, I've seen a lot of people playing "play-to-earn" (p2e) games without any clue how it works. A lot of bad projects exist, and many people try to make their own p2e game without understanding the concept of a 'Ponzi scheme' or the technical implementation... |
|
|
By @konkiewicz [ 5 Min read ] In recent years, the emergence of Large Language Models (LLMs) has brought about significant shifts in the daily routines of consumers. Individuals can now undertake a diverse range of tasks, such as retrieving information, composing text, and refining documents through these powerful language tools. This integration of LLMs into daily life has resulted in notable boosts in productivity, both at work and in personal endeavors. However, it’s important to recognize that not all consumers have experienced these benefits equally. Indeed, a considerable number of people around the world who speak less common languages aren’t able to interact with LLMs, primarily due to the inadequacy of language models designed for these specific languages. With 7,000 languages currently spoken in the world, the largest multilingual LLMs have been trained using only fewer than a hundred languages, thus leaving many languages and people completely behind... |
What Is E-Waste Hacking? TL;DR You may know about e-wastes environmental risks, but what about its security risks? Heres how hackers use discarded devices to steal your personal data. Read More. |
|
By @zacamos [ 6 Min read ] Electronic waste — better known as e-waste — has been a massive problem for years. However, most people have never even heard of the term. Unfortunately, whether they realize it or not, it impacts them directly. How does e-waste hacking put you at risk? Most people don’t think twice about what happens to their electronics when they throw them away or trade them in. In almost every case, their old devices become e-waste. Common examples include phones, computers, printers, monitors, smart devices and wearables. Almost all electronics contain materials like nickel, flame retardants, and cadmium that either are or can become hazardous if disposed of improperly. For example, lithium-ion batteries can produce noxious smoke if damaged and toxic liquid if exposed to water. In landfills, these devices poison the air, waterways, and soil by leeching heavy metals and poisonous chemicals... |
Additional Stories of your interest: |
Considered to have released one of the first personal computers, Xerox PARC company included a mouse in their release of Lilith. |
|
The world's largest passenger airliner and only full-length double-deck jet airliner, Airbus A380, had its first maiden flight. It has a seating for 525 passengers, with a maximum certified capacity for 853 passengers. |
|
Samuel Morse, co-inventor of the Morse code is born. He helped to develop the commercial use of telegraphy. |
|
|
X (formerly Twitter) has initiated its "Ads Revenue Sharing" program, designed to share ad revenue with verified creators. The program, now available globally, is intended to retain top talent on the platform and has a budget of $5 million for the first round of creator payments. |
We hope you enjoy this 48 minutes worth of free reading material. Feel free to forward this email to a nerdy friend who'll love you for it. See you on Planet Internet! With love, The HackerNoon Team ✌️ |
Want to get different tech stories?
|
|
|
|