sumi.news
  • Search
  • Following
  • Sign in
← Back to news
HackerNoon
H

HackerNoon RSS Feed

  • hackernoon.com
  • cdn.hackernoon.com/feed

  • Latest
  • Sat Dec 13

Missed Ethereum (ETH) at $100? Analysts See 750% Upside in This New Crypto

5d
HackerNoonH

Why Pepeto Outshines Trump Coin: Meme Coin Winners and Losers in 2026

5d
HackerNoonH

How to Fix Dysfunctional Leadership Teams and Why It's Important to Do So

5d
HackerNoonH

MS Marks Significant Milestone as ADGM-Licensed Company Service Provider

5d
HackerNoonH

Damian AI: A Digital Persona Built From My Work (and a Lot of Pivots)

5d
HackerNoonH

I Built an On-Chain Video Game in the Time It Takes to Watch Netflix

5d
HackerNoonH

“Everything’s Async” Until Your RAM Explodes: The JavaScript Backpressure Problem

5d
HackerNoonH

Why Regulated Enterprises Can’t Just “Use Kafka” — and What to Run Instead

5d
HackerNoonH

Beyond SQL Parsing: Extracting Lineage from Python ETL by Splitting the Job Across Three LLM Agents

5d
HackerNoonH

Beyond the Hype: Four Surprising Truths About AI ROI in 2025

5d
HackerNoonH

Sunday Scares and Data Leadership: The Pattern That Breaks Us

5d
HackerNoonH

CSS is Only Hard Because You’re Doing Too Much

5d
HackerNoonH

Navigating Technology advancements mid-way through your career

5d
HackerNoonH

The Discovery Gap: Why ChatGPT Knows Your Startup But Won't Recommend It

5d
HackerNoonH

AI Is Not Just an API Call: What iOS Engineers Learn the Hard Way in Production

5d
HackerNoonH

5 Open-Source Fashion Projects to Use for Free —and Support with Kivach

5d
HackerNoonH

When Machines Think: A Modern Candide on AI, AGI, and Human Meaning

5d
HackerNoonH

Why Markets Struggle to Read Signals in a World of Quiet Constraints

5d
HackerNoonH

Not Everything Should Be Automated

5d
HackerNoonH

The Silent Trauma of Cleaning Up Other People's Security Mistakes

5d
HackerNoonH

Rural Banking stack-3 Or The Magic of Conversations

5d
HackerNoonH

From Experiment to Enterprise: Governing AI Agents for Measurable ROI

5d
HackerNoonH

Beyond the Hype: Why a “Trust Gap” Forced My Custom Voice AI Architecture

5d
HackerNoonH

How to Build Connections for A/B Testing and Linear Regression: An Essential Guide

5d
HackerNoonH

PostgreSQL & HypoPG: The Experimental Foundation of IA2 Index Selection

6d
HackerNoonH

Make Q1 Marketing Count: Focus, Execute, Deliver

6d
HackerNoonH

AI Expert Ajith Suresh Is Advancing Enterprise Decision Intelligence at Global Scale

6d
HackerNoonH

Reducing Docker Container Start-up Latency: Practical Strategies for Faster AI/ML Workflows

6d
HackerNoonH

How to Find Your “Voice” and Ideal Writing Workflow

6d
HackerNoonH

The HackerNoon Newsletter: When DeFi Turns Reputation Into Middleware (1/7/2026)

6d
HackerNoonH

Beyond Preprocessing: Sequential Indexing and Temporal Consistency in IA2

6d
HackerNoonH

I Saw a Phishing Site That Traps Security Bots

6d
HackerNoonH

Symfony 7.4: How to Master Multi-Step Forms

6d
HackerNoonH

Sachin Gupta: Redefining Modern Audit Through Technology and Analytics

6d
HackerNoonH

How Strategic Technical Leadership Is Reshaping Retirement Services Technology

6d
HackerNoonH

Back to Basics: Database Design as Storytelling

6d
HackerNoonH

The TechBeat: IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel (1/7/2026)

6d
HackerNoonH

Inside Cloud-Scale Systems: A Discussion with Abhinav Sharma

6d
HackerNoonH

How Rishabh Agarwal Turns Software Optimization Into Scalable Engineering Impact

6d
HackerNoonH

When DeFi Turns Reputation Into Middleware

6d
HackerNoonH

Comments, Naming, and Abstractions in the AI Era

6d
HackerNoonH

System Design in the Age of AI: What Still Requires Human Judgment

6d
HackerNoonH

How I stopped fighting AI and started shipping features 10x faster with Claude Code and Codex

6d
HackerNoonH

Wrapping up Trends in MacOS Malware of 2025

6d
HackerNoonH

Building a Self-Healing Web Tester with AI Agents and Combinatorial Logic

6d
HackerNoonH

Smarter Spend, Fewer Regrets: How AI Changes Startup Marketing Decisions

6d
HackerNoonH

Inside Ethereum Blob Encoding (PeerDAS): How FFT and Polynomials Generate Parity Cells

6d
HackerNoonH

5 Ways Your AI Agent Will Get Hacked (And How to Stop Each One)

6d
HackerNoonH

The 6-Second Rule: How to Hack the Grant Reviewer's Dopamine Receptors

6d
HackerNoonH

Meta-Prompting: From “Using Prompts” to “Generating Prompts”

6d
HackerNoonH
More →

Entries updated Jan 13, 2026 09:23:53 AM PST

Questions? Suggestions? alex@sumi.news