Remove hide
Remove IP Remove Networking Remove Social Network
article thumbnail

Looking Back On Tech, Startups, And VC In 2018

Haystack

companies, more sensitivity around technology IP and security. It’s winter in crypto land, and the bulls are hiding with the bears now. cities flocking to these machines, downloading apps for each network, and paying just a few bucks to get from Point A to B. 1/ Social Network Interference.

article thumbnail

I’m sticking with Disqus. Here’s Why

Both Sides of the Table

Commenting on topical blogs is a form of topical social networking in the same way that Quora is. They want to know about when my son scores a goal (ok, probably not) not when I’m debating somebody online about the future of social networks. I personally hate when people hide behind anonymity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Startups in stealth mode need one piece of advice - Discussion

news.ycombinator.com

We already have some competitors in the vertical and while there is no point in trying to hide the actual idea, there are differences in the way we implement stuff that can get us an advantage over the competition. >> Thinking you should hide your idea means you should really look closely in the mirror and reevaluate yourself.

Stealth 41
article thumbnail

How To Create a Web App

www.readwriteweb.com

I think, if you can swing it, the first round of the core technology / IP should be developed by the founders. Build out everything in css/xhtml and use javascript to open and hide divs with dummy data (for Ajax simulation). c:php4pear) in Unknown on line 0 Posted by: Steve Poland | October 4, 2007 10:42 AM Great article. Why do this?

Web 40
article thumbnail

CEO Friday: Why we don’t hire.NET programmers

blog.expensify.com

They write everything from assembly to jQuery, on PCs to mobile phones, doing hard core computer graphics to high level social networking. Big things, like obscuring the networking stack under so many countless layers of abstraction that it’s virtually impossible to even imagine what bytes are actually going over the wire.

Java 107