HackerNoon Tech Stories Archive March 11th, 2018
S
M
T
W
T
F
S
12345678910111213141516171819202122232425262728293031Joel Libava ♛
When can I start offering my security token? Polymath might have the answer.
Bogdan Fiedur
Designing for iPhone X: 9 Tips to Create a Great-Looking Application
Annie Dai
How to tackle GDPR — The Engineering Style
Netanel Bar Ilan
The New Bitcoin Debate: Proof of Work Change vs. Defensive Patents
ecurrencyhodler
Working on a Product with no Traction
Emil Bruckner
Cyber Security Requires an Important Ingredient: Strong UX
Rebecca Strehlow
Freedom of the Four Hour Workweeks: 10 Steps To Successfully Hire A Virtual Assistant
Mohd Asad
Firing is hard but important. And how to do it well.
Anshul Khandelwal
3 Warning Signs You’re About to Invest in a Scam ICO
Marina Baslina
On Git commit messages and issue trackers
Alex Facciorusso
Fantasy VC Portfolio
Jordan Odinsky
Gentle guide on how YOLO Object Localization works with Keras (Part 1)
Chengwei Zhang
The Spirit of Silicon Valley
Pedro Alves
💊Deep Learning in medicine: advancing medical image analysis with Supervisely
Supervise.ly
An ode to my grandfather
Knut Svanholm
Building agile into your career strategy
Al Dea
Put your chatbot where your headless CMS is
Knut Melvær
Is Silicon Valley Over? Not if Investors Can Adapt.
Natalie Fratto
Add Keyboard Shortcuts to Your Web App.
Lubos
Presentation Tips for Pitching Your Sales or Business Ideas
Evi Abada, MD, MS
Try This: Text Only in Emojis 💬😃😞💬🤐
Stephen Cognetta
Decentralized loans on the blockchain
Jon V
Getting Laid Off In Tech
Aakash Japi