gregheartcloudMy Journey to Salesforce.com Certified Technical ArchitectThe one that started it all… originally published on my blog in 2014 when I was pursuing CTA before CTA journey was even a hashtag.Mar 19, 2023
Ashley RogersWhy SedraCoin uses GHOSTDAG protocol and kHeavyHash algorithm and what is the benefit of SDR miningSEDRA is built on the pillars of solidarity and innovation and integrates the Proof of Work SedraCoin, which is based on the advanced…Sep 1Sep 1
Henry Cheng4 ways to make sure your CTA buttons are drawing enough attentionFirst of all, I don’t believe design is more important than copy. Nor do I believe copy is more important than design.Jul 14Jul 14
Am63r_999Sedra wallet and SDR CryptocurrencySedra represents more than just a cryptocurrency; it embodies a comprehensive ecosystem poised to transform collaboration and cooperation…Aug 29Aug 29
gregheartcloudMy Journey to Salesforce.com Certified Technical ArchitectThe one that started it all… originally published on my blog in 2014 when I was pursuing CTA before CTA journey was even a hashtag.Mar 19, 2023
Ashley RogersWhy SedraCoin uses GHOSTDAG protocol and kHeavyHash algorithm and what is the benefit of SDR miningSEDRA is built on the pillars of solidarity and innovation and integrates the Proof of Work SedraCoin, which is based on the advanced…Sep 1
Henry Cheng4 ways to make sure your CTA buttons are drawing enough attentionFirst of all, I don’t believe design is more important than copy. Nor do I believe copy is more important than design.Jul 14
Am63r_999Sedra wallet and SDR CryptocurrencySedra represents more than just a cryptocurrency; it embodies a comprehensive ecosystem poised to transform collaboration and cooperation…Aug 29
Abhijeet DangeinBootcampEvolution Of CTA Buttons Over The Years In Ux DesignWhat are CTA Buttons?Apr 22, 2023
KurtisIntroduction to Sedra and the SedraX MetaverseSedra is an innovative platform based on the GHOSTDAG protocol and the kHeavyHash hashing algorithm, providing secure and efficient digital…Aug 28
Martin HolovskýinCyber Defense Network (Defensive.Network)Cyber Threat Actors — mapping your adversaryIn this article we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how…Feb 17, 2021