sumi.news
  • Search
  • Following
  • Sign in
← Back to news
HackerNoon
H

HackerNoon RSS Feed

  • hackernoon.com
  • cdn.hackernoon.com/feed

  • Latest
  • Thu Aug 28

DTensor 101: Mesh, Layout, and SPMD in TensorFlow

2w
HackerNoonH

Would You Trust Your Government With Your Digital Identity?

2w
HackerNoonH

A Timeline of Public Key Infrastructure: What Worked, What Failed, and What’s Next

2w
HackerNoonH

Why Public Key Infrastructure Isn’t the Silver Bullet for Digital Security

2w
HackerNoonH

53 Years of Public Key Infrastructure and It's Still Broken?

2w
HackerNoonH

From Starlink to DePIN: How Satellites Are Powering a Decentralized Internet

2w
HackerNoonH

The TechBeat: Embedded Gen AI: Smarter Predictive Maintenance Apps for Manufacturing (9/9/2025)

2w
HackerNoonH

How to Track Code deployments in New Relic with Laravel Commands

2w
HackerNoonH

What Investors and AI Researchers Can Learn from Low-Rank Optimization

2w
HackerNoonH

Nice Try, Google, But That’s Not Recursion

2w
HackerNoonH

Train-Set SEO: Why Embedding Your Brand in AI’s DNA is the Future of Search Optimization

2w
HackerNoonH

The Dawn of Autonomous Commerce

2w
HackerNoonH

With the SEC on the Sidelines, Nasdaq Becomes Crypto's New Sheriff

2w
HackerNoonH

Ship Smarter, Not Harder: Affordable Kubernetes CI/CD with GitHub Actions + Helm

2w
HackerNoonH

Floor It

2w
HackerNoonH

Analytics vs. Instinct in Football

2w
HackerNoonH

Inside the Neural Vocoder Zoo: WaveNet to Diffusion in Four Audio Clips

2w
HackerNoonH

Spacecoin and The Promise of Banking The Unbanked From Orbit

2w
HackerNoonH

Think AI Just Arrived in Fintech? Actually, AI Grew Up in Fintech.

2w
HackerNoonH

The 80/20 Rule for Compose Modifiers: How to Unlock Faster UI with Modifier.Node

2w
HackerNoonH

10 Git Commands Senior Devs Should Know (and Use Daily)

2w
HackerNoonH

The HackerNoon Newsletter: Can ChatGPT Outperform the Market? Week 4 (9/8/2025)

2w
HackerNoonH

Can ChatGPT Outperform the Market? Week 4

2w
HackerNoonH

Meet AssemblyAI: HackerNoon Company of the Week

2w
HackerNoonH

Why RevOps Is the New GTM Power Center and What 100M New Data Points Mean for Sales Teams

2w
HackerNoonH

Learn to Build, Train, and Export RetinaNet (ResNet-50) on a Custom Dataset

2w
HackerNoonH

How to Customize BERT Encoders with TensorFlow Model Garden

2w
HackerNoonH

TensorFlow Models NLP Library for Beginners

2w
HackerNoonH

Keras Not Flexible Enough? Orbit Your Way to Better BERT Training

2w
HackerNoonH

TensorFlow Estimators Are Deprecated—Here’s How (and Why) to Migrate

2w
HackerNoonH

The Space Blockchain Rush: Separating Signal from Noise in 2025

2w
HackerNoonH

The TechBeat: Studies Show AI Agents and Browsers Are a Hacker’s Perfect Playground (9/8/2025)

2w
HackerNoonH

The Beginner's Guide to Leveraging AI in Marketing (Without Losing Your Soul

2w
HackerNoonH

AI As the Ultimate Propaganda Machine

2w
HackerNoonH

Nobody Is Holding Predictive Systems Accountable

2w
HackerNoonH

Australia's Digital Transformation Surges $18.5 Billion

2w
HackerNoonH

David Klasing on IRS John Doe Summons: Ensuring Crypto Tax Compliance—What Can Be Done?

2w
HackerNoonH

5 Open-Source Private Messengers to Try for Free —and Support Via Kivach

2w
HackerNoonH

YouTube Gold Button Awarded to World of Dypians Making Web3 Gaming History

2w
HackerNoonH

Developers Can Now Stack and Reorder AI Coding Prompts in Replit

2w
HackerNoonH

educe Truth Bias and Speed Up Unfolding with Moment‑Conditioned Diffusion

3w
HackerNoonH

A Conditional Diffusion Approach to Multidimensional Unfolding Across Physics Processes

3w
HackerNoonH

The HackerNoon Newsletter: The Ins and Outs of Rust 1.81.0 (9/7/2025)

3w
HackerNoonH

CMOs Need To Think Like Data Architects To Win With AI

3w
HackerNoonH

Beyond Policy Papers - Tonga's Cybersecurity Reality Check

3w
HackerNoonH

Everything You Need to Know About All Comparable Types

3w
HackerNoonH

What It's Like to Run a Public Records Audit With a Team of Students

3w
HackerNoonH

Mathematics, Big Data, and AI: How Predictive Maintenance Works Using a Bearing as an Example

3w
HackerNoonH

Migrating DolphinScheduler into K8s: Pitfalls and Lessons Learned from Qihoo 360’s Practic

3w
HackerNoonH

When Random Isn’t Random: How Weak Keys Still Drain Crypto Wallets

3w
HackerNoonH
More →

Entries updated Sep 28, 2025 08:08:19 AM PDT

Questions? Suggestions? alex@sumi.news