How to Hack a Huge Career in Tech with PR Expert & Founder Sarah Evans

By Natasha Nel 
I sat down with Sarah Evans—tech industry PR legend and strategic communications startup founder—to talk all things branding and influence: from personal to B2B. You can watch the Youtube version of this podcast right here in this post, or grab the audio-only on Spotify, or over at podcast.hackernoon.com.

Read the full story

 

How to Not Attribute to Malice Things Adequately Explained by Stupidity

By Vinita Bansal 
We humans crave a perfectly ordered world though the chances of something going as intended is fairly rare. When there’s more than one human being involved in the equation, the predictability goes for a further toss. What do we do when things do not turn out as intended? Instead of being curious and trying to learn from the situation, our mind assumes the worst possibility.

Read the full story

 

The Security Issues in Using Public Wi-Fi  —  “Honeypots” And “Pineapples”

By Vince Tabora 
It is a warm and sunny afternoon on a weekend. This is a good time to head to a cafe to chill for a bit with a coffee and pastry. It is also perfect for some web surfing using the free Wi-Fi service. The next thing you would need to know is the Wi-Fi access point (i.e. hotspot) and password. Now you are all set and connect to the Internet. For the average user this is fine, but for cybersecurity experts there is a risk to using free Wi-Fi services.

Read the full story

 

My Approach To Not Understanding

By Sebastian Gil Rodriguez 
When creating any software, it is almost inevitable to spend a big part of your development time researching, and many times this involves looking for syntax you don't remember, or for finding out how other people have approached the same problem you are trying to solve.

Read the full story

 

Google's Authenticator App Explained and Reviewed

By Rupesh 
Such a cool-sounding term, I had to find out its meaning and purpose. So here is the story.

Read the full story

 

The State of Infrastructure Security Amidst this Pandemic

By Michael Usiagwu 
Around the middle of March, news filtered out of a cyberattack that hit the US Health and Human Services Department. Amid battling a pandemic, the HHS cyberinfrastructure was overloaded but the HHS Secretary, Alex Azar, claimed that "we had no penetration into our networks, we had no degradation of the functioning of our networks." 

Read the full story

 

21 Secret Keys to Building Better Business Software

By Jake Dowie 
I know, 21 is a lot of keys. Software development is complex, don't let anyone tell you different. I imagine some of these points will resonate with you and hopefully some will be new and enlightening.

Read the full story

 

How to Negotiate Everything in Life

By Patrick Murray 
I got a text from my Nanny on a Thursday. "Can I call you?"

Read the full story

 

New Inline Emoji Reactions on Hacker Noon

By Dane Lyons 
The traditional comment box at the end of a blog post is not a sufficient way to facilitate reader and writer communication. It falls short in a number of ways:

Read the full story

 

Bring your idea to life on a
.TECH Domain

 
Twitter
Facebook
Link
Spotify
YouTube
Pinterest
Reddit
GitHub
RSS
Email
SPONSOR THIS NEWSLETTER 🚀

Copyright © 2020 Hacker Noon, All rights reserved.
You are receiving this email because you opted in at our website hackernoon.com.

Our mailing address is:
Hacker Noon
PO Box 2206
Edwards, CO 81632-2206

Add us to your address book


unsubscribe