sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Oct 19
You don't need anubis
2w
L
Skeena Indigenous Typeface
2w
L
Making an Easy-to-Install Application in Python
2w
L
AWK technical notes (2023)
2w
L
react-native-godot: React Native Godot - Embed Godot Engine in React Native apps
2w
L
Zapstore
2w
L
The Collapse of the Web: The Sameness & Death of Difference in Tech
2w
H
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
2w
H
When Even the Cloud Caught a Cold: Inside the AWS and Azure Outages of 2025
2w
H
How to Build an AWS Bedrock Supervisor Agent to Automate EC2 and CloudWatch Tasks
2w
H
How to Design a CLI Tool That Developers Actually Love Using
2w
H
The HackerNoon Newsletter: System Design in a Nutshell (11/2/2025)
2w
H
Three stable kernel updates
2w
W
Code Smell 313 - “Workslop” in AI-Assisted Programming
2w
H
build system tradeoffs
2w
L
Beautiful, concise explanation of why a cycle-accurate 6502 emulator is easier than not
2w
L
A prison of my own making
2w
L
Notes by djb on using Fil-C
2w
L
Thinking About Thinking With LLMs
2w
L
Moving tables across PostgreSQL instances
2w
L
Using FreeBSD to make self-hosting fun again
2w
L
How I Use Every Claude Code Feature
2w
L
The TechBeat: Can ChatGPT Outperform the Market? Week 11 (11/2/2025)
2w
H
Visopsys single developer "Visual Operating System"
2w
L
Attacking macOS XPC helpers: Protocol reverse engineering and interface analysis
2w
L
Program-ing Finger Trees in Coq (2007)
2w
L
De-escalating Tailscale CGNAT conflict
2w
L
X.Org Security Advisory: multiple security issues X.Org X server and Xwayland
2w
L
Port of Linux to WebAssembly
2w
L
GodLoader Malware Loader: What You Need to Be Aware of
2w
H
Debian to require Rust as of May 2026
2w
W
Claude Code Can Debug Low-level Cryptography
2w
L
Text rendering and effects using GPU-computed distances
2w
L
How to Post Mindfully: A Guide
2w
H
The HackerNoon Newsletter: Elaborate Hoaxes in the Age of AI (11/1/2025)
2w
H
Elaborate Hoaxes in the Age of AI
2w
H
Open-Source Ada: From Gateware to Application
2w
L
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
2w
H
The Hidden Ledger of Code: Tracking the Carbon Debt Inside Our Software
2w
H
Go: Can It Mitigate Supply Chain Attacks?
2w
H
A deep dive into deeply recursive Go
2w
L
The Tailscale Fall Update in under 8 minutes
2w
L
Hard Rust requirements from May onward
2w
L
On the purported benefits of effect systems
2w
L
Computer Says No: Error Reporting for LTL
2w
L
The TechBeat: From Cloud to Desk: 3 Signs the AI Revolution is Going Local (11/1/2025)
2w
H
Your URL Is Your State
2w
L
Intent to Deprecate and Remove: Deprecate and remove XSLT
2w
L
Rethinking Data Discovery for Libraries and Digital Humanities
2w
L
How L.A. Scores “Vulnerability” of Unhoused People Is Changing: What You Need to Know
2w
H
More →