sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Jun 3
Midas And 0G Partner To Bring Real-World Assets To AI-Native Blockchain Infrastructure
2d
H
How to Fix Your Context
3d
L
Software engineering with LLMs in 2025: reality check
3d
L
Parsing Layout, or: Haskell's Syntax is a Mess
3d
L
Types of Types: Common to Exotic
3d
L
The End of the Guessing Game? Why Describing Data Beats Estimating It
3d
H
Built for Scale: eXchange1 Brings Institutional-Grade Crypto Trading to Indian Users
3d
H
DORA Regulation Explained - Plus a Free Compliance Checklist
3d
H
The HackerNoon Newsletter: Will VR Integration for Remote Work Become Permanent? (7/1/2025)
3d
H
It's Not Just What's Missing, It's How You Say It: CLAIM's Winning Formula
3d
H
The Present of Collapse: A Metaphysical Framework of NP, P, and the Recursive Field of Truth
3d
H
Teaching AI to Say "I Don't Know": A Four-Step Guide to Contextual Data Imputation
3d
H
I Automated My Content Side Hustle with Notion, ChatGPT, and Zapier — Here's the Exact Workflow
3d
H
Emoji Kitchen - Browse Google's unique emoji combinations
3d
L
The Last Rank We Need? QDyLoRA's Vision for the Future of LLM Tuning
3d
H
Local LLM Tool Calling: Which LLM Should You Use?
3d
L
Exception handling in rustc_codegen_cranelift
3d
L
What If Your Blog Had a Product Manager? (Hint: It’s You)
3d
H
CLAIM: A Contextual Language Model for Accurate Imputation of Missing Tabular Data
3d
H
Faster, More Accurate IoT Security: A Quantitative Analysis of the CUMAD Framework
3d
H
Redefining IoT Threat Detection: The Power of Cumulative Analysis in the CUMAD Framework
3d
H
Solving the IoT's "Boy Who Cried Wolf" Problem: From Individual Alerts to Cumulative Certainty
3d
H
FUZZING'25 Keynote: "Are you sure you belong in academia?"
3d
L
Helix language
3d
L
Cloud native LSM Key-Value Store with searchable compression algo and distributed compaction
3d
L
How to Build a Modular Selenium + Cucumber Framework in Java
3d
H
GNU Health Hospital Information System 5.0 released
3d
W
How CUMAD Accumulates Evidence to Unmask Compromised IoT Devices
3d
H
input-branches: Workflow and flake-part for flake input patching using imported git branches
3d
L
[$] Yet another way to configure transparent huge pages
3d
W
Building the Unbreakable Contract: A Pipeline for AI-Powered Vulnerability Classification and Repair
3d
H
Introducing pay per crawl: enabling content owners to charge AI crawlers for access
3d
L
Will VR Integration for Remote Work Become Permanent?
3d
H
A Novel Pipeline for Classifying and Repairing Smart Contracts at Scale
3d
H
Why You Can't Miss SpoonOS's Developer Call S1 for AI Innovation
3d
H
Why Your Next Smart-Home Device Hunts Mosquitoes: Meet Bzigo Iris
3d
H
Little Pepe (LILPEPE) Breezes Past 3rd Presale Stage in Record Time
3d
H
Stablecoins, Smart Contracts and The Rise of More Intelligent Cash
3d
H
[$] Improved load balancing with machine learning
3d
W
15 Years of OsmAnd
3d
W
From Python Programmer to Distributed Systems Researcher in 10 Years Without a PhD
3d
L
Security updates for Tuesday
3d
W
Why Extracting Text From PDFs Still Feels Like a Hack–And the Legacy Design that Keeps AI Stuck
3d
H
How Blockchain Is Redefining Financial Inclusion for the Unbanked in 2025
3d
H
From Crisis to Security - How DePIN Can Solve Tonga's Cybersecurity Challenges
3d
H
Finding and understanding bugs in C compilers (2011)
3d
L
Alternative Blanket Implementations for a Single Rust Trait
3d
L
How U.S. Copyright Law Applies to LLM Training
3d
H
QDyLoRA in Action: Method, Benchmarks, and Why It Outperforms QLoRA
3d
H
Beyond Static Ranks: The Power of Dynamic Quantization in LLM Fine-Tuning
3d
H
More →