sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Jun 8
How I Use GetBlock API For Onchain Data Analysis
3w
H
Everything You Thought Was Sci-Fi? The European Space Agency Is Building It
3w
H
Troubleshooting SSL: Why Your SSL Certificate Isn't Working on Windows
3w
H
What are Content Coins? the New Crypto Trend Where Media is Ownable, Tradable, Investable
3w
H
AI Learns Common Sense from Touch, Not Just Vision
3w
H
If the Moon Were Only 1 Pixel - A tediously accurate map of the solar system
3w
L
Quantum Computing without the Linear Algebra
3w
L
Rendering crispy text on the GPU
3w
L
Asterinas: A Linux ABI-compatible, Rust-based framekernel OS
3w
L
macOS Tahoe brings a new disk image format
3w
L
Three Algorithms for YSH Syntax Highlighting
3w
L
What I talk about when I talk about IRs
3w
L
jemalloc Postmortem
3w
L
The Case for Software Craftsmanship in the Era of Vibes
3w
L
A Beginner's Guide to Mass Unsubscribing on Gmail
3w
H
Why 100% Code Coverage Isn’t Optional Anymore
3w
H
Cursor YOLO deleted everything in my computer
3w
L
Frequent reauth doesn't make you more secure
3w
L
“Feels Like Someone Else Is Coding”: My Surreal Experience with Copilot Agent in ASP.NET8
3w
H
Why Data Lies (and Your Model Might Too): The Curious Case of Simpson’s Paradox
3w
H
Zero-Knowledge Proofs: The Privacy Tech That Lets You Prove Everything Without Revealing Anything
3w
H
How AI Will (Actually) Upend the Labor Market
3w
H
Want to Win $1,500? Describe How Blockchain Nodes Power Web3 Applications
3w
H
Architecture Decision Records
3w
L
Use-after-free in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)
3w
L
The Open-Source Privacy Project Making Untrusted Devices Work Together Securely
3w
H
New Secure Computing Tech Handles AI, Video, and Data Without Leaking Secrets
3w
H
New Privacy Tech Lets Untrusted Parties Compute Together Without Leaking Secrets
3w
H
IceCap Turns Arm Devices Into Secure Compute Environments—No Extra Hardware Needed
3w
H
New Study Backs Confidential Computing Despite Security Flaws
3w
H
New Tech Lets Even Old Devices Run Sensitive Tasks Without Risking Your Privacy
3w
H
[$] FAIR package management for WordPress
3w
W
Summaries from the 2025 Python Language Summit
3w
W
Rocky Linux 10.0 released
3w
W
diceomatic: a DSL for making children's dice games
3w
L
Naive Bayes Outperforms Rivals in Audit Sampling of Financial, Text, and Network Data
3w
H
Taiwan Study Maps Global Research Gap in AI-Based Audit Sampling
3w
H
Taiwan Study Finds AI Can Assist Auditors with Big Data Sampling
3w
H
Solving LinkedIn Queens with SMT
3w
L
The HackerNoon Newsletter: Salt Typhoon: The Hidden Hand Behind the Telecom Gift Card Scam? (6/12/2025)
3w
H
Bitcoin-Led DeFAI Model Offers Regulatory, Cost Advantages
3w
H
Reflections on Sudoku, Or the Impossibility of Systematizing Thought
3w
L
Meet UseCodify, Hoken Tech & Star for Life Ukraine: HackerNoon Startups of The Week
3w
H
The Python Language Summit 2025
3w
L
Salt Typhoon: The Hidden Hand Behind the Telecom Gift Card Scam?
3w
H
[$] Parallelizing filesystem writeback
3w
W
Security updates for Thursday
3w
W
CP/M 2.2, CP/M 3.0, CP/M-86, Concurrent CP/M-86 listings by Digital Research
3w
L
Understand Tech Rolls Out Scalable, Secure AI Deployment Platform for Enterprises
3w
H
Rumour: Google intends to discontinue the Android Open Source Project
3w
L
More →