sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Fri May 23
Everything You Thought Was Sci-Fi? The European Space Agency Is Building It
1w
H
Troubleshooting SSL: Why Your SSL Certificate Isn't Working on Windows
1w
H
What are Content Coins? the New Crypto Trend Where Media is Ownable, Tradable, Investable
1w
H
AI Learns Common Sense from Touch, Not Just Vision
1w
H
If the Moon Were Only 1 Pixel - A tediously accurate map of the solar system
1w
L
Quantum Computing without the Linear Algebra
1w
L
Rendering crispy text on the GPU
1w
L
Asterinas: A Linux ABI-compatible, Rust-based framekernel OS
1w
L
macOS Tahoe brings a new disk image format
1w
L
Three Algorithms for YSH Syntax Highlighting
1w
L
What I talk about when I talk about IRs
1w
L
jemalloc Postmortem
1w
L
The Case for Software Craftsmanship in the Era of Vibes
1w
L
A Beginner's Guide to Mass Unsubscribing on Gmail
1w
H
Why 100% Code Coverage Isn’t Optional Anymore
1w
H
Cursor YOLO deleted everything in my computer
1w
L
Frequent reauth doesn't make you more secure
1w
L
“Feels Like Someone Else Is Coding”: My Surreal Experience with Copilot Agent in ASP.NET8
1w
H
Why Data Lies (and Your Model Might Too): The Curious Case of Simpson’s Paradox
1w
H
Zero-Knowledge Proofs: The Privacy Tech That Lets You Prove Everything Without Revealing Anything
1w
H
How AI Will (Actually) Upend the Labor Market
1w
H
Want to Win $1,500? Describe How Blockchain Nodes Power Web3 Applications
1w
H
Architecture Decision Records
1w
L
Use-after-free in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)
1w
L
The Open-Source Privacy Project Making Untrusted Devices Work Together Securely
1w
H
New Secure Computing Tech Handles AI, Video, and Data Without Leaking Secrets
1w
H
New Privacy Tech Lets Untrusted Parties Compute Together Without Leaking Secrets
1w
H
IceCap Turns Arm Devices Into Secure Compute Environments—No Extra Hardware Needed
1w
H
New Study Backs Confidential Computing Despite Security Flaws
1w
H
New Tech Lets Even Old Devices Run Sensitive Tasks Without Risking Your Privacy
1w
H
[$] FAIR package management for WordPress
1w
W
Summaries from the 2025 Python Language Summit
1w
W
Rocky Linux 10.0 released
1w
W
diceomatic: a DSL for making children's dice games
1w
L
Naive Bayes Outperforms Rivals in Audit Sampling of Financial, Text, and Network Data
1w
H
Taiwan Study Maps Global Research Gap in AI-Based Audit Sampling
1w
H
Taiwan Study Finds AI Can Assist Auditors with Big Data Sampling
1w
H
Solving LinkedIn Queens with SMT
1w
L
The HackerNoon Newsletter: Salt Typhoon: The Hidden Hand Behind the Telecom Gift Card Scam? (6/12/2025)
1w
H
Bitcoin-Led DeFAI Model Offers Regulatory, Cost Advantages
1w
H
Reflections on Sudoku, Or the Impossibility of Systematizing Thought
1w
L
Meet UseCodify, Hoken Tech & Star for Life Ukraine: HackerNoon Startups of The Week
1w
H
The Python Language Summit 2025
1w
L
Salt Typhoon: The Hidden Hand Behind the Telecom Gift Card Scam?
1w
H
[$] Parallelizing filesystem writeback
1w
W
Security updates for Thursday
1w
W
CP/M 2.2, CP/M 3.0, CP/M-86, Concurrent CP/M-86 listings by Digital Research
1w
L
Understand Tech Rolls Out Scalable, Secure AI Deployment Platform for Enterprises
1w
H
Rumour: Google intends to discontinue the Android Open Source Project
1w
L
Nexchain Enters Stage 18
1w
H
More →