sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Jul 27
Inside Tongcheng Travel’s Journey to a Unified Data Channel with Apache SeaTunnel
2d
H
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
2d
H
Renting vs Buying Ships: Which is Better in Star Citizen 4.2?
2d
H
Marketing Is Psychological Warfare: How to Sell in a World Full of Noise
2d
H
What's the Deal With OpenAI Not Knowing How GPT-4 Works?
2d
H
Ofcom vs 4chan: Is the Online Safety Act About to Trigger a Global Free Speech War?
2d
H
Ethos Ex Machina: When AI Generates Trust Without Verification
2d
H
EstateX Scales Luxury Real Estate Tokenization Through Melia Hotels Partnership, Opens U.S. Market
2d
H
LLMs, Innovation Investing : Human Intelligence Research Lab
2d
H
SwapRocket — No KYC Crypto Exchange 2025
2d
H
What Happens When You Sign a Crypto Transaction (And What Could Go Wrong)
2d
H
Bro, ban me at the IP level if you don't like me
2d
L
Security updates for Monday
2d
W
Mario 64 wastes so much memory
2d
L
Regular Expression Matching Can Be Simple And Fast (2007)
2d
L
Numerical Validation of UAV‑CRN Optimization: Improved Rates Under Energy and PLoS Constraints
2d
H
Linear scan with lifetime holes
2d
L
Don't pick weird subnets for embedded networks, use VRFs
2d
L
ghrc.io Appears to be Malicious
2d
L
The Future of Tractable Deep Generative Models
2d
H
PyJuice Pushes HMMs and Image Models Beyond State-of-the-Art
2d
H
Optimizing Backpropagation with PC Flows
2d
H
How Block-Based Parallelization Cuts IO and Computation Overhead
2d
H
Why Researchers Are Betting on PCs to Power the Next Wave of AI
2d
H
Key Bottlenecks in PC Parallelization
2d
H
Marshal madness: A brief history of Ruby deserialization exploits
2d
L
The ROI of Cybersecurity Investments: How Businesses Can Quantify and Justify Security Spending
2d
H
I Don't Like Imports
2d
L
Automating Pre-Push Checks with Jujutsu
2d
L
anubis_offload: userscript to offload Anubis PoW to native CPU or GPU code
2d
L
kruci: Post-mortem of a UI library
2d
L
Visionary Stories, Real-World Technologies: The Science Fiction Legacy!
2d
H
Shift Left is Dead: Here's What Secure Product Teams Are Doing Instead
2d
H
After The Layoff: What's Next?
2d
H
BCD‑SCA Based Optimization for UAV‑CRN: Joint Trajectory, Power, and Scheduling Design
2d
H
How We Increased Team Productivity with Employee Monitoring Software
2d
H
Joint UAV Trajectory and Power Design in Energy‑Constrained Cognitive Radio Networks
2d
H
Meet Uzi World Digital, Winner of Startups of the year 2024 in Kolkata, West Bengal, India
2d
H
Better Steering with Less Data: Kinematic Priors Guide Trajectory Prediction
2d
H
frogmouth: A Markdown browser for your terminal
2d
L
From vx, vy to δ and a: The Math Behind Smarter Self‑Driving Predictions
2d
H
Why Growing Companies Shouldn’t Rely Too Heavily on No-Code Tools
2d
H
From Guesswork to Ground Truth: Making Traffic Forecasts Physically Feasible
2d
H
Kernel prepatch 6.17-rc3
2d
W
Using Availability‑Throughput Bounds to Improve Blockchain Fee Design and Welfare
2d
H
Running Out of Stock? How Mathematics Guarantees Welfare in Posted‑Price Sales
2d
H
Answer Engine SEO: How to Make Your Website AI-Readable in 2025
2d
H
Deepfake CEOs, AI Job Applicants & the Future of Identity Verification
2d
H
The Soup Kitchen Bound: ReLU Inequalities at the Core of Availability vs. Throughput
2d
H
New Concentration Inequalities for Availability‑Throughput Tradeoffs with Applications in Economics
2d
H
More →