Bookmarks (2031)

  • screenshot

    How Primary Committee Size Impacts Blockchain Security in Discrepancy Detection Protocols

    This section focuses on the key security parameter—primary committee size—within the Discrepancy Detection (DD) protocol for...

  • screenshot

    Exploring Cutting-Edge Approaches to Iterative LLM Fine Tuning

    Section 6 – Related Work dives into various AI training approaches, categorizing them by whether they...

  • screenshot

    The Voices That Inspire HackerNoon

    2 weeks left to participate in the HackerNoon survey and win big prizes! Today, let's look...

  • screenshot

    Who Owns AI Art? A Deep Dive into Copyright, Intellectual Property, and Liability

    Artificial intelligence is changing the way we think about art. ChatGPT, DALL·E, and Midjourney all use...

  • screenshot

    Abhaya Uprety is Reshaping Parking One Line of Code at a Time

    Abhaya Uprety co-founded ParkStash, a startup that makes parking reservations work in a way similar to...

  • screenshot

    How Transaction Order Finality Drives Blockchain State in Layer 2 Systems

    The paper emphasizes transaction order finality as key to determining blockchain state. It outlines different finality...

  • screenshot

    Building a Game with AI: Fast, Flawed, and Full of Potential

    Cursor is an AI coding assistant that can be used by developers to speed up their...

  • screenshot

    Prompt Injection Is What Happens When AI Trusts Too Easily

    Prompt Injection is a top threat to GenAI Large Language Models (LLMs) applications. Tips on how...

  • screenshot

    AI That Trains Itself? Here's How it Works

    The experiments evaluate the DNO algorithm (specifically, DNO-Prct) using an iterative training process that combines GPT-4-Turbo...

  • screenshot

    Finally, a Way to Run Your Shopify Store Without Clicking Yourself Into Madness

    ShopCTL lets you easily manage your Shopify store via the command line, offering quick commands to...

  • screenshot

    DIY Real-Time Polling App Locks Down Access With Supabase and Permit.io

    A full-stack guide to building a secure, real-time polling app with authentication, per-user permissions, and dynamic...

  • screenshot

    I Thought Good Engineering Meant Writing Good Code. Now I Know Different

    When I joined my last company, we were just 20 people, figuring things out as we...

  • screenshot

    How Layer 2 Rollups Handle Data Availability and Garbage Collection Efficiently

    In Layer 2 rollups, data availability is crucial for transaction processing. CallData is stored on-chain, while...

  • screenshot

    I Vibe Coded an AI App and Got DDOS'd Instead

    Last week, Google introduced its AI copilot Firebase Studio, and I decided to give it a...

  • screenshot

    Clean Code, Dirty Planet: Unpacking CBDC's Footprint

    The article explores the environmental challenges posed by traditional cryptocurrencies and delves into the potential of...

  • screenshot

    How Contrastive Learning Helps AI Self-Improve

    This section introduces DNO-Prct, a practical and scalable implementation of Direct Nash Optimization. It leverages iterative...

  • screenshot

    Not Every Metric Needs a Goal—The Truth About Setting Smart SLOs

    This story talks about how to determine right goals for your systems and explains them through...

  • screenshot

    Want Faster Loans and Fewer Scams? Automate Everything

    P2P lending platforms are fast becoming the way forward. People can now easily borrow and lend...

  • screenshot

    Bitcoin Crashed Again—But This Time, It’s Not the End of the World

    Bitcoin hit an all-time high this year, but has since slumped. The rally was a textbook...

  • screenshot

    This Color Tool Turns Any Image Into a Wes Anderson Fever Dream

    Ditch RGB. Use LAB to extract, apply, and fine-tune color palettes that make your images look...

  • screenshot

    The Components of an Ideal Layer 2 Rollup Design

    The ideal Layer 2 rollup design aims for efficiency, high throughput, and low latency with instant...

  • screenshot

    Opening Financial Markets to Everyone: An Interview with Valentin Preobrazhenskiy, CEO of LATOKEN

    In this interview, LATOKEN CEO Valentin Preobrazhenskiy explains how the platform opens financial markets to all...

  • screenshot

    Blockchain Consensus Mechanisms, Once and For All: PoW, PoS, and Rollups

    This section explains various methods by which blockchain systems decide on the correct state, focusing on...

  • screenshot

    Why L2s on Public Chains Offer the Best of Both Worlds

    Public L1s with private L2s present an optimal architecture for cross-border CBDCs, offering decentralization without infrastructure...

  • screenshot

    How Swap Volume and Gas Fees Impact CBDC Exchange Costs

    Simulations confirm L2-L3 systems outperform L1-Mariana across transaction volumes—especially under high gas fees. Even with fragmented...

  • screenshot

    Understanding CallData in Blockchain Transaction Execution

    This section delves into the significance of callData in blockchain transactions, ensuring data availability for state...

  • screenshot

    Fuse and Check Point Are Trying to Build the First Blockchain Firewall—Here’s What That Means

    Fuse partners with Check Point to introduce the first real-time blockchain firewall, aiming to shift from...

  • screenshot

    What Happens When You Swap 1 Million Euros in CBDCs?

    Using historical FX data and Curve v2 contracts, the simulation compares CBDC swap costs in L1-Mariana...

  • screenshot

    From Styled Components to Tailwind CSS: A HackerNoon Migration Story

    HackerNoon is transitioning from Styled Components to Tailwind CSS to modernize its frontend, reduce clutter, and...

  • screenshot

    What You Need to Know About Gas Fees and Slippage

    The total cost of a CBDC swap includes gas fees, liquidity provider (LP) fees, and price...

  • screenshot

    How to Setup a CI/CD Pipeline with GitHub Actions

    This guide shows you how to set up a CI/CD pipeline using GitHub Actions to automate...

  • screenshot

    The TechBeat: Google Gemini Did Not Disappoint on These Blockchain x AI Use Cases (4/15/2025)

    How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has...

  • screenshot

    MindEye2 (Not Pretrained) vs. MindEye1

    In this section, we show how MindEye2 outperforms MindEye1 even without pretraining on other subjects.

  • screenshot

    MindEye2: Shared-Subject Models Enable fMRI-To-Image With 1 Hour of Data: Single-Subject Evaluations

    In this section, we show more exhaustive evaluation metrics computed for every subject individually using 40...

  • screenshot

    How AI Agents Could Have Supercharged Pfizer’s COVID-19 Vaccine Development

    AI agents are systems that can reason, act, and learn over time. They aren’t just passive...

  • screenshot

    MindEye2 Dataset: fMRI Preprocessing and Normalization

    Provides further details about the fMRI dataset used in MindEye2, including preprocessing and normalization procedures.

  • screenshot

    Behind the Scenes: The Making of MindEye2

    Details the contributions of each author involved in the development and research of MindEye2.

  • screenshot

    Becoming a Writer in a Hyperconnected World

    All platforms are now engaging, interactive. We can collaborate everywhere. To know the best platforms for...

  • screenshot

    If Getting Laid-off is Bad, Wait Till You See What AI Does to Corporates

    AI advancements present a bigger threat to bureaucracy corporates than it does to highly-skilled professionals.

  • screenshot

    Inside the System That Optimizes Cross-Border Digital Currency Trading

    This section details a multi-layer blockchain system where a Layer-2 rollup manages CBDC integration and routing,...

  • screenshot

    This Study Breaks Down the True Costs of CBDC Exchange

    This study shows that a multi-AMM setup on Layer-2 blockchains reduces total costs of CBDC swaps—fees...

  • screenshot

    What Layer-2 Rollups Mean for CBDC Trading

    This section explains how Layer-2 rollups reduce costs and improve scalability for blockchain networks, and examines...

  • screenshot

    A New Architecture for Cross-Border CBDC Trading

    This paper proposes a multi-layer blockchain system using Layer-2 and competing Layer-3 AMMs to enable cheaper,...

  • screenshot

    "The only real moat that exists is consumer mindshare," says Friend.com CEO Avi Schiffmann

    Avi Schiffmann is the Founder/CEO of Friend.com, the new AI necklace companion. Previously Avi dropped out...

  • screenshot

    Answer to Win Your Share of $5000: What is a Blockchain Node and How Does it Work?

    This prompt guides you to explore blockchain nodes—what they are, how they work, and why they...

  • screenshot

    BingX Kicks off Its 7th Anniversary With "Your Voice, Our Story" Campaign

    BingX is celebrating its 7th anniversary with a user story campaign. The campaign invites users to...

  • screenshot

    Meet Aptible: HackerNoon Company of the Week

    This week, we are proud to present Aptible, a Platform as a Service (PaaS) that gives...

  • screenshot

    This Simple App Lets You See How Hollywood Uses Color to Mess With Your Emotions

    Learn how color grading works, what color targets are, and build your own palette-based grading tool...

  • screenshot

    This Detective Game Helps Beginners Master SQL and Database Logic

    A new way to learn SQL: solve crimes using real SQL queries. Build database logic fast...