sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat May 10
Fri May 9
louise: Polynomial-time Meta-Interpretive Learning for logic programming
4d
L
Naked objects
4d
L
Code Smell 299 - How to Fix Overloaded Test Setups
4d
H
Investigating Ring's Crime Alert System for Police Departments: How We Did It
4d
H
STEPS 2012 Progress and Final NSF Report
4d
L
Introducing Rust 1.86.0: Trait Upcasting, HashMaps, and More
4d
H
DCJ11 Single Board Computer (PDP-11)
4d
L
Exploiting Copilot AI for SharePoint
4d
L
Announcing Lix 2.93 “Bici Bici”
4d
L
I Want to Love Linux. It Doesn’t Love Me Back
4d
L
Reverse engineering the 386 processor's prefetch queue circuitry
4d
L
The HackerNoon Newsletter: Vue.js: Propagating Props Like a Pro (5/10/2025)
4d
H
Are We Serious About Using TLA+ For Statistical Properties?
4d
L
Secure by Design: Google’s Perspective on Memory Safety (2024)
4d
L
How Cell-Based Architecture Helps Big Systems Scale
4d
H
Changelog Slack is dead. Long live Zulip
4d
L
Lume 3 was released
4d
L
TrueNAS CORE is Dead – Long Live zVault
4d
L
Get Your Team to Speak Up: Here's How
4d
H
HACKSAT25: The first multi-tenant satellite unikernel security challenge
4d
L
Introduction to Universal Scene Description (2021)
4d
L
A tool to verify estimates, II: a flexible proof assistant
4d
L
Testing sourcery.ai and GitHub Copilot for cockpit PR reviews
4d
L
A Performance Investigation Challenge
4d
L
bold linker v0.2.0 release - bold just got faster
4d
L
Slow Software for a Burning World
4d
L
In praise of grobi for auto-configuring X11 monitors
4d
L
Tuscolo Static Certificate Transparency Log
4d
L
The TechBeat: Big Monitoring, Small Budget: Powering Observability on Kubernetes with Prometheus, Grafana & Mimir (5/10/2025)
4d
H
Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape
4d
L
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
5d
L
Spatial Data-Management (1979)
5d
L
Algebraic Effects: Another mistake carried through to perfection?
5d
L
A Formal Analysis of Apple’s iMessage PQ3 Protocol
5d
L
The Best Way to Protect Your Packages and Your Ethics
5d
H
Digital Defenders: Meet Syed Shahzaib Shah, Pakistan’s Ethical Hacker Changing the Game
5d
H