By Linh Dao Smooke I remember it was during the last week of January when my American family & friends were all at a dinner table discussing what was then a foreign, "China-contained" new disease called Coronavirus. The virus had infected about ~1000 people worldwide, 500 alone in Wuhan, China, and 1-2 cases in the US. I told the group that just days ago, the Vietnamese government ordered all schools to be closed for the foreseeable future, as would be many "non-essential" public gatherings and businesses. People were on high alert. Masks and hand sanitizers were severely out of stock. Read the full story By Kunal Agrawal “Good design is actually a lot harder to notice than poor design, in part because good designs fit our needs so well that the design is invisible,” ― Don Norman Read the full story By Aanand Krishnan It’s one thing to share user geolocation data deliberately without consent, but what if you’re inadvertently giving it away?Read the full story By Jérôme Spielmann In this article, we are going to build a simple Ethereum wallet from scratch using Python. During the process, we will use some cryptography and try to interact with the Ethereum blockchain. In part 1, we will generate a key pair which is compatible with the Ethereum protocol, obtain the Ethereum address from the public key and encrypt the private key using a password.Read the full story By Jeff We started as a PoW coin however soon realised for the sake of security (namely preventing 51% attacks and ASIC miners), we'd be better suited to having a Proof-of-Stake consensus mechanism. So we moved over from mining to staking without a hitch and took advantage of this new setup by developing our own 'Leased Proof-of-Stake' mechanism, which allows users to stake their coins via a service provider who take a small percentage from each staking reward for running the service. Read the full story By Aaron Gershwin Virtual Private Networks are compared in many aspects: some are judged by their speed, others by their server amount, and the reputation of all is put under the looking glass. However, only on rare occasion VPN protocols are brought into the light. And there are a few reasons for that.Read the full story By Pedro H F Donda When we start learning how to create a web page and are presented to CSS, it can be quite daunting (or exhilarating) to see the list of properties we can use. So many of them, so much we can do! So, when we're fumbling through the pages and are presented with "easy" ways to become web-developers, we grab them without a second thought.Read the full story By Matt Klein The media calamity of “The Corona” is disturbing and dismal, but even still, many are buzzed. It’s so titillating that we just can’t help but… participate ourselves.Read the full story By Maximiliano Contieri A root cause analysis of all failures of our software will find a single culprit with multiple costumes. The enemy is always there. Many times disguised as laziness, sometimes simplification, and very frequently with the optimization outfit.Read the full story |
|