sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Oct 26
Skeena Indigenous Typeface
3w
L
Making an Easy-to-Install Application in Python
3w
L
AWK technical notes (2023)
3w
L
react-native-godot: React Native Godot - Embed Godot Engine in React Native apps
3w
L
Zapstore
3w
L
The Collapse of the Web: The Sameness & Death of Difference in Tech
3w
H
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
3w
H
When Even the Cloud Caught a Cold: Inside the AWS and Azure Outages of 2025
3w
H
How to Build an AWS Bedrock Supervisor Agent to Automate EC2 and CloudWatch Tasks
3w
H
How to Design a CLI Tool That Developers Actually Love Using
3w
H
The HackerNoon Newsletter: System Design in a Nutshell (11/2/2025)
3w
H
Three stable kernel updates
3w
W
Code Smell 313 - “Workslop” in AI-Assisted Programming
3w
H
build system tradeoffs
3w
L
Beautiful, concise explanation of why a cycle-accurate 6502 emulator is easier than not
3w
L
A prison of my own making
3w
L
Notes by djb on using Fil-C
3w
L
Thinking About Thinking With LLMs
3w
L
Moving tables across PostgreSQL instances
3w
L
Using FreeBSD to make self-hosting fun again
3w
L
How I Use Every Claude Code Feature
3w
L
The TechBeat: Can ChatGPT Outperform the Market? Week 11 (11/2/2025)
3w
H
Visopsys single developer "Visual Operating System"
3w
L
Attacking macOS XPC helpers: Protocol reverse engineering and interface analysis
3w
L
Program-ing Finger Trees in Coq (2007)
3w
L
De-escalating Tailscale CGNAT conflict
3w
L
X.Org Security Advisory: multiple security issues X.Org X server and Xwayland
3w
L
Port of Linux to WebAssembly
3w
L
GodLoader Malware Loader: What You Need to Be Aware of
3w
H
Debian to require Rust as of May 2026
3w
W
Claude Code Can Debug Low-level Cryptography
3w
L
Text rendering and effects using GPU-computed distances
3w
L
How to Post Mindfully: A Guide
3w
H
The HackerNoon Newsletter: Elaborate Hoaxes in the Age of AI (11/1/2025)
3w
H
Elaborate Hoaxes in the Age of AI
3w
H
Open-Source Ada: From Gateware to Application
3w
L
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
3w
H
The Hidden Ledger of Code: Tracking the Carbon Debt Inside Our Software
3w
H
Go: Can It Mitigate Supply Chain Attacks?
3w
H
A deep dive into deeply recursive Go
3w
L
The Tailscale Fall Update in under 8 minutes
3w
L
Hard Rust requirements from May onward
3w
L
On the purported benefits of effect systems
3w
L
Computer Says No: Error Reporting for LTL
3w
L
The TechBeat: From Cloud to Desk: 3 Signs the AI Revolution is Going Local (11/1/2025)
3w
H
Your URL Is Your State
3w
L
Intent to Deprecate and Remove: Deprecate and remove XSLT
3w
L
Rethinking Data Discovery for Libraries and Digital Humanities
3w
L
How L.A. Scores “Vulnerability” of Unhoused People Is Changing: What You Need to Know
3w
H
How We Found 7 TiB of Memory Just Sitting Around
3w
L
More →