sumi.news
  • Search
  • Following
  • Sign in
← Back to news
HackerNoon
H

HackerNoon RSS Feed

  • hackernoon.com
  • cdn.hackernoon.com/feed

  • Latest
  • Tue Dec 30

The Remote Developer's Survival Guide: 10 Technical Strategies to Prevent Burnout

1w
HackerNoonH

How to Enter the Proof of Usefulness (PoU) Hackathon

1w
HackerNoonH

The Midnight Lesson Planner: How to Reclaim Your Evenings and Ignite Your Classroom

1w
HackerNoonH

Why I started a Bitcoin Education Website

1w
HackerNoonH

Geometric Deep Learning: Neural Networks in Spherical, Hyperbolic, and Non-Euclidean Spaces

1w
HackerNoonH

Instagram Creators Should Check If Their Posts Are Being Deemed Political

1w
HackerNoonH

How to Make Your Legacy Exception-Throwing Code Compatible With Lambdas

1w
HackerNoonH

AlphaTON Launches Claude Connector Powered By TON And Telegram

1w
HackerNoonH

How to Add the AWS WAF CAPTCHA to an Angular Application

1w
HackerNoonH

Educational Byte: What Are Fed Rates and Why Do They Affect Crypto Prices?

1w
HackerNoonH

The HackerNoon Newsletter: 5 Risks You Have To Take as a Leader (1/22/2026)

1w
HackerNoonH

Why Expected Value Is Not Enough in Production Trading Systems

1w
HackerNoonH

How to Advertise Your Startup the Right Way

1w
HackerNoonH

Why “It Works” Is Often the Most Dangerous Phrase in Product Design

1w
HackerNoonH

The Problem With Perfect AI Is That Mathematics Won’t Allow It

1w
HackerNoonH

Optimization Log: How I Pushed a 2,750-Word Guide to 97/100 PageSpeed for AI Search

1w
HackerNoonH

How Static and Hybrid Analysis Can Cut Privacy Review Effort by 95%

1w
HackerNoonH

What 100 GitHub Projects Reveal About Personal Data in Modern Software

1w
HackerNoonH

Agentic AI Is Forcing Organizations to Rethink How Work Is Designed

1w
HackerNoonH

Data-Driven Ranking Reveals Where Privacy Risks Actually Live in Java and JavaScript Code

1w
HackerNoonH

From Written Off to Tech Lead: How Gowtham Reddy Kunduru Built Engineering Leadership

1w
HackerNoonH

The TechBeat: CodeRabbit vs Code Reviews in Kilo: Which One Is Best For You in 2026 (1/22/2026)

1w
HackerNoonH

New Research Shows 64% of Third-Party Applications Access Sensitive Data Without Authorization

1w
HackerNoonH

Turns Out 30% of Your AI Model Is Just Wasted Space

1w
HackerNoonH

The NVIDIA Nemotron Stack For Production Agents

1w
HackerNoonH

Rent or Own? How the "Rug Pull" Era is Pushing Developers Toward Source-Available Software

1w
HackerNoonH

Can Large Language Models Develop Gambling Addiction?

1w
HackerNoonH

Navigating Architectural Trade-offs at Scale to Meet AI Goals in 2026

1w
HackerNoonH

The FrankenPHP Version Trap: Why Your Laravel Octane Stack Isn’t Using PHP 8.5

1w
HackerNoonH

Essential Cybersecurity Measures Every Modern Business Should Take

1w
HackerNoonH

How to Start a Career as a Junior Developer in 2026

1w
HackerNoonH

Math in the Age of Machine Proof

1w
HackerNoonH

A Step-by-Step Framework for Stress-Testing Trading Strategies

1w
HackerNoonH

Your First Interactive Plot in Python: A Hands-On Plotly Guide

1w
HackerNoonH

AI in the Workplace: A Threat to Managers or a Tool for Better Leadership?

1w
HackerNoonH

Scale Is Not a Goal: Why Most Software Architectures Are Overbuilt

1w
HackerNoonH

Google's Jules Starts Surfacing Work on Its Own, Signaling a Shift in AI Coding Assistants

1w
HackerNoonH

How I Built an Engine That Turns Architecture Sketches Into Animations

1w
HackerNoonH

Why 70% of Developers Don’t Trust Plugins—and How I Built a Fix

1w
HackerNoonH

5 Risks You Have To Take as a Leader

1w
HackerNoonH

Does MariaDB Depend on MySQL?

1w
HackerNoonH

AI Hype vs Reality in Cybersecurity Explained

1w
HackerNoonH

Probabilistic ML: Natural Gradients and Statistical Manifolds Explained

1w
HackerNoonH

Benchmarking 1B Vectors with Low Latency and High Throughput

1w
HackerNoonH

Deep Learning via Continuous-Time Systems: Neural ODEs and Normalizing Flows Explained

1w
HackerNoonH

Why “Intent-First” Design Could Change How Humans Work With Gen AI

1w
HackerNoonH

The Silent AI Breach: How Data Escapes in Fragments

1w
HackerNoonH

An End-to-End System for Generating Frontends from Sketches with LLMs

1w
HackerNoonH

Four Key Trends in Theoretical Machine Learning (2026)

1w
HackerNoonH

BingX Lists SKR, The Native Token of Solana Mobile

1w
HackerNoonH
More →

Entries updated Jan 29, 2026 08:35:41 PM PST

Questions? Suggestions? alex@sumi.news