Inside the dYdX Chain: Exploring the Future of Cryptocurrency Governance

Since its debut, the DYDX token has substantially increased its utility across various critical areas such as Security, Staking, and Governance within the dYdX Chain, establishing itself as a fundamental asset in the ecosystem’s infrastructure. As of now, approximately 149 million DYDX tokens, which constitute 14.9% of the total supply, are staked with 60 active … Read more

PIECHAIN Demo: Exploring a Practical Blockchain Interoperability Framework

:::info Authors: (1) Daniel Reijsbergen, Nanyang Technological University, Singapore, Singapore; (2) Aung Maw, Singapore University of Technology and Design, Singapore, Singapore; (3) Jingchi Zhang, Nanyang Technological University, Singapore, Singapore; (4) Tien Tuan Anh Dinh, Deakin University, Melbourne, Australia; (5) Anwitaman Datta, Nanyang Technological University, Singapore, Singapore. ::: Content Overview Abstract & Introduction Overview of PIEChain … Read more

Learn How Free Apps Make Money

I always wondered how free apps make money. I did some research on this and found a lot of different avenues to follow. Let’s jump into the ins and outs of how to earn money with free apps Background I always encountered those exciting, sometimes annoying ads and pop-ups while browsing the web. YouTube has … Read more

Running Your Own Local LLMs: Updated for 2024 with 8 New Open Source Tools!

“` ![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e1389b0-fa19-4f88-8541-ea0eb9bc5b41_1024x1024.jpeg) :::info All Images Generated With Bing Image Creator. It’s Awesome! (DALL-E-3) ::: > This is the breakout year for Generative AI! ![](https://cdn.hackernoon.com/images/9SBj6OzMvXOEhDxTjjuu75pLYnp1-1g839wg.png) *Yes, this article’s been written by a violinist and there’s new content! Spectacular new and awesome content!* **Well; to say the very least, this year, I’ve been spoiled for choice as … Read more

Navigating Complex Search Tasks with AI Copilots: Abstract and Taking Search to task

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Ryen W. White, Microsoft Research, Redmond, WA, USA. ::: Table of Links Abstract and Taking Search to task AI Copilots Challenges Opportunities The Undiscovered Country and References ABSTRACT As many of us in the information retrieval (IR) research community know and appreciate, … Read more

Understanding Scaling Law through Data Science Lenses

Language models (LMs) represent a highly versatile category of technology, processing text inputs to generate textual outputs. Contemporary research has illuminated that this adaptable text-to-text framework can be harnessed to address a myriad of tasks without necessitating task-specific adjustments (i.e., absent fine-tuning or architectural changes) through the use of prompting methods to enable precise zero … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Conclusion and Bibliography

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Methodology

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Limitations

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Results

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Discussion

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Research Questions

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit of Conspiracies on the Net: Abstract and Introduction

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

A Comparative Algorithm Audit: Conspiracy Theories in the Online Environments

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

Web Search Results: Biases, Inaccuracies and Their Consequences

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Aleksandra Urman, She is a corresponding author from Department of Informatics, University of Zurich, Switzerland; (2) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern, Switzerland; (3) Roberto Ulloa, GESIS – Leibniz-Institut für Sozialwissenschaften, Germany; (4) Juhi Kulshrestha, Department of … Read more

We’ve Been Here Before: The Impacts of Today’s Age of AI

Accelerated employment. Wage gains. Faster investment, more information and notable gains in productivity. These were all hallmarks of the 1990s, a period that looms large in the memories of those who witnessed this time of innovation and skyrocketing long-term growth. New technologies, like computers and software, gave rise to a greater reliance and utilization of … Read more

How to Bypass GPTZero AI Detection

AI writing tools have drastically streamlined the content creation process across a wide range of fields and professions. However, the rise of AI detectors like GPTZero that work to detect AI content stands in the way of that. To make matters worse, these platforms aren’t foolproof. In other words, your content can still be falsely … Read more

7 Ways to Make Use of Llama-3 for Free

After digging deep and scouring the internet, I’m excited to share my findings on how to harness the power of Llama-3 without breaking the bank! As a large language model, Llama-3 has the potential to revolutionize the way we work and create, but accessing its capabilities can come with a hefty price tag. Determined to … Read more

Start Strong: Tips for Tech Product Managers for Product Positioning and Launch

Throughout my decade-long career as a Technical Product Manager, I have had the pleasure of launching multiple high-impact products in the Enterprise technology space. My experience spans the entire technology stack, from launching x86 servers to delivering Infrastructure as a Service (IaaS) cloud platforms and launching Software as a Service (SaaS) solutions. And across these … Read more

4 Case Studies in UX Audit: Insights and Best Practices for Improving User Experience

Do you know what our brain is afraid of the most? Blindspots, unclarity, vagueness. Our brain seeks rules, patterns, and templates because they provide guidance and give us a feeling of confidence we’re going the right way. That’s why we like examples. It’s more easy and convenient to follow somebody’s successful experience than pay your … Read more

Unity Communications Founder on Building the Company

:::info Welcome to HackerNoon’s Writing Prompts! Would you like to take a stab at answering some of these questions? The link for the template is HERE. ::: Over a decade ago, I founded Unity Communications with a vision to boost company growth through outstanding leadership and customer service. Today, we connect a driven global workforce with … Read more

Biometrics: A Beacon of Trust in the Digital Media Landscape

Online media is currently grappling with a crisis characterized by diminishing trust, the widespread dissemination of misinformation, and the alarming proliferation of fake news and experiences. This article delves into the challenges plaguing the digital media landscape and proposes the adoption of biometric technology as a potential solution. Biometrics, with its capabilities in identity verification, … Read more

Leveraging LLMs for Generation of Unusual Text Inputs in Mobile App Tests: Related Work

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Zhe Liu, State Key Laboratory of Intelligent Game, Beijing, China Institute of Software Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China; (2) Chunyang Chen, Monash University, Melbourne, Australia; (3) Junjie Wang, State Key Laboratory of Intelligent … Read more

How to Implement Multi-Group Bar Chart and Interact With Highlighting by Grouping Dimension

😊 I am a developer of VChart, so I will introduce the solution in VChart. Description Solution for implementing a multi-group bar chart similar to the following figure: Expect two groups to differentiate in style through color transparency. When the mouse hovers over a column block, all blocks of the same color are highlighted in … Read more

Investing in IoT Applications: All You Need to Know

The Inte­rnet of Things (IoT) is an advanced te­chnology that has evolved from being just a tre­ndy phrase to a groundbreaking innovation with countless applications across various se­ctors. In agriculture, IoT sensors can monitor soil moisture, te­mperature, and other factors to optimize­ crop growth. In healthcare, they can track patie­nts’ vital signs, medication adherence­, and … Read more