sumi.news
  • Search
  • Following
  • Sign in
← Back to news
HackerNoon
H

HackerNoon RSS Feed

  • hackernoon.com
  • cdn.hackernoon.com/feed

  • Latest
  • Tue May 20

The HackerNoon Newsletter: Happy Birthday, Mr. President (6/14/2025)

5d
HackerNoonH

How AI Is Revolutionizing Agile Program Management with Confluence & Streamlit

6d
HackerNoonH

The Getblock Theory: A Developers Guide

6d
HackerNoonH

Happy Birthday, Mr. President

6d
HackerNoonH

Answer to Win Your Share of $5,000: How Does GetBlock Simplify Full Node Hosting?

6d
HackerNoonH

The TechBeat: The Case for a Decentralized Cloud: How Vendor Lock-in Broke Cloud Storage (6/14/2025)

6d
HackerNoonH

The Missing Infrastructure Layer: Why AI's Next Evolution Requires Distributed Systems Thinking

6d
HackerNoonH

How Do Hackers Get Phishing Emails Past Filters?

6d
HackerNoonH

Rust 1.83.0: Detailing the Changes

6d
HackerNoonH

Facebook Is Watching and Tracking Kids As They Prep for College

6d
HackerNoonH

Introducing a Flagship MCP Sample App Powered by Azure AI Foundry And LlamaIndex.TS

6d
HackerNoonH

How We Taught a Neural Network to Design Headstones

6d
HackerNoonH

The AI Box Is Coming—Build Your Own or Be Owned by Big Tech

6d
HackerNoonH

Claude Code Makes Every Other AI Coding Tool Look Amateur

6d
HackerNoonH

Boosting LLM Decode Throughput: vAttention vs. PagedAttention

6d
HackerNoonH

tf.distribute 101: Training Keras on Multiple Devices and Machines

6d
HackerNoonH

vAttention Performance & Portability for LLM Prefill Phase

6d
HackerNoonH

The HackerNoon Newsletter: What to Do While I Wait for ChatGPT (6/13/2025)

6d
HackerNoonH

You Don’t Need an Extraordinary Life to Write Compellingly

6d
HackerNoonH

How to Write Custom Training Loops in Keras with GradientTape

6d
HackerNoonH

Code Smell 303 - How to Prevent Breaking Existing Clients When You Make Changes

6d
HackerNoonH

The Trust Revolution in Online Gambling: History of Provable Fairness

6d
HackerNoonH

AI-Assisted Cyber Attack Methods That Could Cripple Your Business

6d
HackerNoonH

Keep Keras fit() and Train Your Model Your Way

6d
HackerNoonH

Nexchain Raises $4.3M in Crypto Presale

1w
HackerNoonH

What to Do While I Wait for ChatGPT

1w
HackerNoonH

What Is Server Automation

1w
HackerNoonH

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility

1w
HackerNoonH

Denmark's Digital Liberation - A Historic Victory for Open Source Advocacy

1w
HackerNoonH

One Tweet, $3B Gone: Lessons for 2025 Investors

1w
HackerNoonH

Stop Drowning in Dev Tools—These 7 Are Worth Bookmarking

1w
HackerNoonH

Building Armenia’s First Live Seafood Supply Chain: A Business Case in Market Creation

1w
HackerNoonH

Brainwaves to Bytes: How AI Networks are Rewiring the Mind-Machine Interface

1w
HackerNoonH

What’s The Worst That Could Happen? These Security Mistakes Nearly Showed Me

1w
HackerNoonH

How I Use GetBlock API For Onchain Data Analysis

1w
HackerNoonH

Everything You Thought Was Sci-Fi? The European Space Agency Is Building It

1w
HackerNoonH

Troubleshooting SSL: Why Your SSL Certificate Isn't Working on Windows

1w
HackerNoonH

What are Content Coins? the New Crypto Trend Where Media is Ownable, Tradable, Investable

1w
HackerNoonH

AI Learns Common Sense from Touch, Not Just Vision

1w
HackerNoonH

A Beginner's Guide to Mass Unsubscribing on Gmail

1w
HackerNoonH

Why 100% Code Coverage Isn’t Optional Anymore

1w
HackerNoonH

“Feels Like Someone Else Is Coding”: My Surreal Experience with Copilot Agent in ASP.NET8

1w
HackerNoonH

Why Data Lies (and Your Model Might Too): The Curious Case of Simpson’s Paradox

1w
HackerNoonH

Zero-Knowledge Proofs: The Privacy Tech That Lets You Prove Everything Without Revealing Anything

1w
HackerNoonH

How AI Will (Actually) Upend the Labor Market

1w
HackerNoonH

Want to Win $1,500? Describe How Blockchain Nodes Power Web3 Applications

1w
HackerNoonH

The Open-Source Privacy Project Making Untrusted Devices Work Together Securely

1w
HackerNoonH

New Secure Computing Tech Handles AI, Video, and Data Without Leaking Secrets

1w
HackerNoonH

New Privacy Tech Lets Untrusted Parties Compute Together Without Leaking Secrets

1w
HackerNoonH

IceCap Turns Arm Devices Into Secure Compute Environments—No Extra Hardware Needed

1w
HackerNoonH
More →

Entries updated Jun 20, 2025 02:37:58 AM PDT

Questions? Suggestions? alex@sumi.news