Search

Nalezeno "LD Research": 1840

Enforcing performance budgets with webpack


As you probably know, a single monolithic JavaScript bundle — once a best practice — is no longer the way to go for modern web applications. Research has shown that larger bundles increase memory usage and CPU costs, especially on mid-range and low-end mobile devices. webpack has a lot of features...

Form design


A very digestable guide from Geri Reid on building forms. Not the code, but the design and UX principles that should guide the code. Working on a design system for a bank has taught [me] a lot about forms. I’ve watched testing in our labs. I’ve worked alongside experts from specialist...

BitMEX Research Installs Blockstream Bitcoin Satellite System


Research and development arm of BitMEX, the Seychelles based crypto exchange, BitMEX Research announced on Monday that it has installed the Blockstream Bitcoin Satellite system which will allow it to download and verify BTC’s blockchain without internet connection. In the official Twitter thread...

Bitcoin Whales Using 2020 to Accumulate BTC - Research


Large bitcoin (BTC) buyers used the market crash in March to increase their holdings while the largest "whales" became most active this past summer, a new report suggested. After exploring transaction data on the Bitcoin blockchain that happened between January 2020 and the beginning...

Ticino Blockchain Technologies Association Has Been Established


Lugano, 10 September 2020 – The Ticino Blockchain Technologies Association aims to promote research and support innovative companies active in the Blockchain sector, as well as to promote academic studies of this new technology, thanks to the participation of USI (University of Southern...

Research: New Malware Employs Tor and Bittorrent To Steal Bitcoin and Ether


A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace