Remove tag it-recruitment
article thumbnail

The complete guide to hiring a Full-Stack Developer using HackerEarth Assessments

Hacker Earth Developers Blog

In this guide, let’s take a look at the different types of question types for full-stack assessments available on HackerEarth, and how they can help your tech recruiting team in assessing candidates better. Because fullstack development spans across a broad spectrum of skills it’s not straightforward to assess these skills.

article thumbnail

What Recruiters Can Focus On During A Tech Hiring Freeze

Hacker Earth Developers Blog

There is nothing more frustrating to a recruiter than this phrase. It doesn’t matter if you are a human resources representative for a company or a recruitment agency. When recruiting and hiring stops, a company can save money and remain operational. Now, how can you, as a recruiter, use this time positively?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Lessons from content marketing myself (aka blogging) for five years

Erik Bernhardsson

I started writing this blog in late 2012, partly because I felt like it would help me improve my English and my writing skills, partly because I kept having a lot of random ideas in my head and I wanted to write them down somewhere. I set up a Wordpress blog on my crappy Swedish virtual private server. A few hundred hits in a day!

Marketing 100
article thumbnail

Lessons from content marketing myself (aka blogging) for five years

Erik Bernhardsson

I started writing this blog in late 2012, partly because I felt like it would help me improve my English and my writing skills, partly because I kept having a lot of random ideas in my head and I wanted to write them down somewhere. I set up a Wordpress blog on my crappy Swedish virtual private server. A few hundred hits in a day!

Marketing 100
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Dive into six things that are top of mind for the week ending April 12. 1 - CISA to federal agencies: Act now to mitigate threat from Midnight Blizzard’s Microsoft email hack Midnight Blizzard, a nation-state hacking group affiliated with the Russian government, stole email messages exchanged between several unnamed U.S. So said the U.S.

article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. If true, this indicates that keys to the Alibaba OSS buckets used by WatchDog were leaked on Github and the buckets were subsequently recruited as unwitting malware hosts. This includes WatchDog steg payloads from this blog.

Malware 96
article thumbnail

KubeCon EU 2023: Themes, Talks, and (Movie) Trailers

Daniel Bryant

Please come and find us to learn more about Envoy Gateway , Emissary-ingress , Telepresence , or TAG Contributors ! TAG Contributor Strategy: What We Get Out of It (and You Could Too!) (16:30–17:05, TAG CS members share how giving back has shaped their careers, advanced their skills, and grown their own communities.