sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Fri Jan 24
XrossRoad Announces Strategic Partnership With Berachain To Expand Japanese IP In Web3
5d
H
Chris Biscardi: Growing little experiments (with Rust & Bevy)
5d
L
IEnumerable Isn’t What You Think It Is—And It’s Breaking Your Code
5d
H
Zuzalu’s Crypto Nomads Are Thinking About Settling Down—And That Might Be Their Biggest Mistake
5d
H
Can DPFL Methods Improve Power Grid Predictions? Here’s What We Found
5d
H
Lost in Linearization: Why Some DPFL Methods Just Can’t Keep Up
5d
H
Electric Truths: What 16 Power Grid Models Reveal About DPFL
5d
H
Meet Chainwire: HackerNoon Company of the Week
5d
H
The Stupidest Requests on the Dark Web Come from Regular People
5d
H
Design, Manufacturing and Open-Loop Control of a Soft Pneumatic Arm: Conclusions
5d
H
Evaluating PAUL’s Weight Carrying Capacity and Kinematic Model Performance
5d
H
Lies We Often Tell Ourselves: Simplicity, Microservices, and More
5d
H
MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client
5d
L
Build Rails Apps with Components
5d
L
These years in Common Lisp: 2023-2024 in review
5d
L
The HackerNoon Newsletter: AI Knows Best—But Only If You Agree With It (2/18/2025)
5d
H
exo software - A distributed LLM solution running on a cluster of computers, smartphones, or SBCs
5d
L
Write About Spacecoin's Mission to Decentralize the Internet and Win From 15,000 USDT
5d
H
Valentine Special: Hot or Not? The Unbalanced Scale of Modern Dating
5d
H
SWE-Lancer: Can Frontier LLMs Earn $1 Million from Real-World Freelance Software Engineering?
5d
L
A milestone for reproducible openSUSE
5d
W
[$] FUSE folio conversion confusion
5d
W
Stable kernel 6.12.15
5d
W
Security updates for Tuesday
5d
W
How Software Quality Assurance (SQA) Turns Chaos Into Clean, Reliable Software
5d
H
A Venture Studio Using Multi-Agent AI Systems to Make Better Investment Decisions
5d
H
The Art of Data Creation: Behind the Scenes of AI Training
5d
H
Japanese engineers talk about difficulties they faced with the Nintendo Switch
5d
L
Reviewing the Cryptography Used by Signal
5d
L
How Journey is Bridging Revenue Dead Zones in B2B Sales
5d
H
How S2|DATA's Libertas Tool Simplifies Restoration of Legacy NetBackup Data
5d
H
Breaking the Chain: How Scribe Security is Redefining Software Supply Chain Protection
5d
H
Self-Designing Software
5d
L
Hide and Seek in Memory: Outsmarting Sneaky Malware with Data Magic
5d
H
go-attention: A full attention mechanism and transformer in pure Go
5d
L
Code Style Sheets: CSS for Code
5d
L
The TechBeat: Cybercrooks Are Using Fake Job Listings to Steal Crypto (2/18/2025)
5d
H
Learning Lean: Part 1
5d
L
mtr metrics
5d
L
New "faux bus" API merged for Linux 6.14, including both Rust & C bindings
5d
L
ArcaOS 5.1.1 released (modern OS/2)
5d
L
How to set up NetSuite Token-based Authentication (TBA) in Laravel
5d
H
Making Cooking a Breeze By Building Your Own Recipe Finder With Nodejs
5d
H
Here's What You Need to Know Before Using Event Sourcing
5d
H
Bitcoin's Utility Cannot Be Measured by Its Ability to Generate Profits
5d
H
How to work with Koin Scopes in Jetpack Compose Navigation
5d
H
ACCESS.bus: The Forgotten USB Competitor
5d
L
Innovating with Purpose: How Marut Pandya Is Building a Career in AI
5d
H
Everything You Need to Know to Launch Your Crypto Startup in 2025
5d
H
Trump’s Trade Wars Ignite the 21st-Century Gold Rush
5d
H
More →