sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Wed Nov 6
Tue Nov 5
Avoid These 7 Leadership Mistakes That Will Limit Your Team’s Growth
2w
H
Emulator of Odra 1003/1013, Polish mainframes of the 1960s
2w
L
Here's Why Talent Isn't Rare. This Is.
2w
H
Navigating Advanced Web Scraping: Insights and Expectations
2w
H
The Top React Reporting Tools
2w
H
What's wrong with stickers in Telegram? Deanonymize anonymous channels in two clicks
2w
H
Fruit Credits: a personal accounting app based on hledger
2w
L
Exploring Postgres's arena allocator by writing an HTTP server from scratch
2w
L
How WebSockets cost us $1M on our AWS bill
2w
L
Implementing Trivial Relocation in Library
2w
L
Reliable Immutable Transfer Protocol
2w
L
Perhaps Rust needs "defer"
2w
L
Get Rich Building Verticalized AI Wrappers (Even If You Don’t Code)
2w
H
Why Netflix Might Need to Change Its Film Distribution Strategy
2w
H
The Product Manager’s Decision Making Dilemma
2w
H
Localized, web-based, markdown, note-taking app inspired by textpod
2w
L
Why Podia doesn’t use review apps anymore
2w
L
[$] Building secure images with NixOS
2w
W
How to Add a Blazor Server App to an ASP.NET Model/Controller Web API
2w
L
Thoughts on Improving Messaging Protocols — Part 2, Matrix
2w
L
The HackerNoon Newsletter: Zuzalu is Dead. Long Live Zuzalu! - Metamorphosis Commenced v3 (11/6/2024)
2w
H
Funding restored for man-page maintenance
2w
W
Implementing distributed pooling in Elixir
2w
L
China’s Digital Yuan: A CBDC Model Reducing Cash Dependency and Expanding Financial Access, Says WEF
2w
H
Can India Secure a Strong Position in the Global Semiconductor Market?
2w
H
AI is Taking Over Your Bank, and You Might Not Even Know It
2w
H
Security updates for Wednesday
2w
W
UNIX Programmer's Manual: Third Edition (1973)
2w
L
USDT Drama: Tether Labels WSJ U.S. Probe Claims as ‘Irresponsible Reporting’
2w
H
Upcoming changes to the DNSSEC root trust anchor
2w
L
Data Centric AI? Yes, but…
2w
H
Turing kicked us out of Heaven (2023)
2w
L
Predicting Links in Graphs with Graph Neural Networks and DGL.ai
2w
H
Securing Text Fields in iOS Apps: Restricting 'Cut,' 'Copy,' and 'Paste' Operations Using Swift
2w
H
Internationalizing Database Data Using Linked Localization Tables
2w
H
Rio: WebApps in pure Python — A fresh Layouting System
2w
H
How to Stand Out in Machine Learning Interviews: A Framework for ML System Design
2w
H
Vegetation in COD:BO4
2w
L
The TechBeat: Introducing Rootstock Genesis Countdown: User Guide (11/6/2024)
2w
H
Transforming Legacy with Domain-Driven Design, I: Preconditions
2w
H
GoToSocial WASM-based SQLite driver and BSD
2w
L
SEO Strategies for Optimizing Hotel Websites
2w
H
How SLSA Can Secure Your Software Supply Chain
2w
H
From The Brink of Collapse to a Comeback: Odysee Heads to the Arweave Blockchain
2w
H
5 Tech Tools To Keep Your Business Secure in a Hyper-Connected World
2w
H
Uncrop.org Review: Premier AI Expander for Outpainting Images Effectively
2w
H
Humanizer.Pro Review: Tool To Make AI Content Human-Like and Undetectable
2w
H
Humanize.io Review: Is This A Simple Way Of Making AI Content Undetectable?
2w
H
Why I love Rust for tokenising and parsing
2w
L
Refactoring 018 - How to Replace a Singleton
2w
H
More →