sumi.news
  • Search
  • Following
  • Sign in
← Back to news
HackerNoon
H

HackerNoon RSS Feed

  • hackernoon.com
  • cdn.hackernoon.com/feed

  • Latest
  • Thu Dec 11

The TechBeat: Can ChatGPT Outperform the Market? Week 18 (12/26/2025)

2w
HackerNoonH

The Workplace as an Ethical Laboratory. Social and Emotional Experience as the Ground of Ethics

2w
HackerNoonH

A Practical Guide to the Saga Pattern in Spring Boot Microservices

2w
HackerNoonH

The Art of Syncing Marketing, PR & Sales to Boost Your KPIs

2w
HackerNoonH

Building the "Spotify Wrapped" of Product Hunt: A 48-Hour Technical Sprint to Map the Maker Economy

2w
HackerNoonH

Groq’s Deterministic Architecture is Rewriting the Physics of AI Inference

2w
HackerNoonH

The Most Dangerous Person on Your Team is "Dave" (And He Just Quit)

2w
HackerNoonH

GPT-5.1 Recasts the AI Race Around Predictability

2w
HackerNoonH

How Luxbridge Realty Approaches Real Estate Differently From Traditional Brokerages

2w
HackerNoonH

How Nikita Kotsehub Bridges AI Research With Real-World Enterprise Solutions

2w
HackerNoonH

This 30-Year-Old Entrepreneur Wants To Build Southeast Asia's Answer To Hims & Hers

2w
HackerNoonH

Anticipating Risk Before It Hits: Surbhi Gupta on the Future of Predictive Analytics

2w
HackerNoonH

Developers Are Gaming Their GitHub Profiles

2w
HackerNoonH

How Jagan Smile Is Redefining Global Network Reliability Through Architectural Innovation

2w
HackerNoonH

Dr. Rakesh Dasari: Engineering Trust and Resilience in the Digital Government Era

2w
HackerNoonH

Choosing an AI for Coding: A Practical Guide

2w
HackerNoonH

The HackerNoon Newsletter: Can ChatGPT Outperform the Market? Week 21 (12/25/2025)

2w
HackerNoonH

Startups, Here’s Everything You (Probably) Missed This Year

2w
HackerNoonH

The TechBeat: Leader or No Leader, That is the Question (12/25/2025)

2w
HackerNoonH

Generative AI Cost & Performance Optimization Starts in the Orchestration Layer

2w
HackerNoonH

Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life

2w
HackerNoonH

Why Low Latency Financial Systems Still Favor Determinism

2w
HackerNoonH

A Year of AI in My Life as an Engineer

2w
HackerNoonH

Solo Satoshi Becomes Authorized Canaan Distributor for Avalon Home Bitcoin Miners.

2w
HackerNoonH

Beyond Keywords: Engineering a Production-Ready Agentic Search Framework in Go

2w
HackerNoonH

From Lagos to Mauritius: We Paid People to Play Mario Kart with Bitcoin

2w
HackerNoonH

From RAG to Agentic RAG: Building Agentic RAG system that runs completely offline.

2w
HackerNoonH

Why Using AI Like a Human Makes You Easier to Replace

2w
HackerNoonH

Reddit Marketing for Solo Founders: A 3-Month Retrospective

2w
HackerNoonH

How Technology is Transforming Gold Trading

2w
HackerNoonH

AI in DevOps: Rise to Agents and Why You Need Agentic Workflows in 2026

2w
HackerNoonH

Hedgehogs vs. Porcupines: In Defense of ‘Spiky’ Writing in the Age of AI

2w
HackerNoonH

2 Billion Requests, 100ms Deadlines, $10k a Month: Engineering a Lean Global RTB System

2w
HackerNoonH

How I Used AI to Fix Inconsistent Attribute Values at Scale in E‑commerce

2w
HackerNoonH

Distributed Tracing in Spring Boot Without OpenTelemetry

2w
HackerNoonH

What DevOps for Data Really Means

2w
HackerNoonH

Cloud Threat Detection with Google Security Command Center - Building a Tiered Alerting System

2w
HackerNoonH

The Poison in the Pipeline: Why AI Training Data Is Your Biggest Security Blind Spot

2w
HackerNoonH

How TIKTAG Attacks Slip Past ARM’s Memory Tagging Defenses

2w
HackerNoonH

How Jay’s Research Is Reshaping AI-Driven Test Automation for Secure Cloud Systems

2w
HackerNoonH

Can ChatGPT Outperform the Market? Week 21

2w
HackerNoonH

The HackerNoon Newsletter: The 2026 Crypto Trends Staying Out of the Spotlight (12/24/2025)

2w
HackerNoonH

The Year in Marketing: What You Need to Read Before 2026

2w
HackerNoonH

How Compliance Requirements Shape Modern Software Architecture

2w
HackerNoonH

'Twas the Night Before Deploy: A Blind Architect’s Chess Engine Journey

2w
HackerNoonH

Liquidity Providers Face a Trade-Off Between Fees and Loss in Concentrated AMMs

2w
HackerNoonH

Why Hardware Memory Tagging Isn’t the Security Silver Bullet It Promised to Be

2w
HackerNoonH

Why Optimal Liquidity Provision Breaks Down in Discrete Blockchain Markets

2w
HackerNoonH

Study Details Practical Attacks That Bypass MTE Protections in Chrome and Linux

2w
HackerNoonH

A Resilient Class of Speculative Attacks Can Leak ARM Memory Tags

2w
HackerNoonH
More →

Entries updated Jan 10, 2026 10:49:04 PM PST

Questions? Suggestions? alex@sumi.news