Proof of Usefulness Report

DerlyG

Analysis completed on 1/24/2026

+6
Proof of Usefulness Score
You're In Business

The project 'DerlyG' appears to be a personal consulting portfolio with no verifiable digital footprint. The URL provided (derlyg.com) yields zero search results or evidence of hosting. The submission contains highly exaggerated and likely false claims (e.g., 'most people have used my product', audience 'everyone'), and uses incorrect business terminology ('marketcap' for revenue). There is no evidence of the claimed traction, team size, or market presence. It falls into the category of unverifiable or non-existent projects.

Ready to Compete for $150k+ in Prizes?

Move this data into a HackerNoon blog draft to become eligible for your share of $150k+ in cash and software prizes

View All Reports

Score Breakdown

Real World Utility+2.50
Audience Reach Impact+0.10
Technical Innovation+0.75
Evidence Of Traction+0.13
Market Timing Relevance+2.00
Functional Completeness+0.25
Subtotal+5.73
Usefulness Multiplierx1.08
Final Score+6

Project Details

Project URL
Description
DerlyG is an InfoSec expert focused on security strategy and architecture. He specializes in the cloud (e.g., ServiceNow, AWS, Azure, GCP), virtualization, containers, and other next-gen environments. Visit his website for more information: www.derlyg.com Environments | Platforms AWS | Google Cloud Platform (GCP) | Azure | IaaS | PaaS | SaaS | Ansible | VMware | Containers | IoT Security | Blockchain Security | Big Data Security | Artificial Intelligence (AI) | SCADA | API Security | DevSecOps | Post Quantum Security | ServiceNow | Hadoop | FinTech | Healthcare | Insurance | Banking | Start-ups | Small Business | Global Corporations Cyber Biz Skills Third-Party Management | Consultant | Advisor | Freelancer | Team Development | Business Impact Analysis | Strategic Planning | Solution Development | Cyber Program Management | Budgeting | Board Briefings | Executive Leadership | Policy Development | Agile Principals | Business Case Development | Security Operations Domain Knowledge Cloud Security | Security Strategy | IT and Data Security | GRC | Access Controls | Risk Management | IT Audit | Security Architecture | Application Security | Network Security | Security Assessment & Testing

Algorithm Insights

Market Position
Growing utility with room for optimization
User Engagement
Documented reach suggests active user community
Technical Stack
Modern tech stack aligned with sponsor technologies

Recommendations to Increase Usefulness Score

Document User Growth

Provide specific metrics on user acquisition and retention rates

Showcase Revenue Model

Detail sustainable monetization strategy and current revenue streams

Expand Evidence Base

Include testimonials, case studies, and third-party validation

Technical Roadmap

Share development milestones and feature completion timeline