sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Fri Oct 17

Defeating KASLR by Doing Nothing at All (Project Zero)

1w
Welcome to LWN.net [LWN.net]W

Bluetui - A TUI for managing bluetooth on Linux

1w
LobstersL

Your AI Co-Pilot Needs a Human Boss: Building a Real Human-in-the-Loop Workflow for Logistics

1w
HackerNoonH

3 Experiments That Reveal the Shocking Inner Life of AI Introduction: Is Anybody Home?

1w
HackerNoonH

agent-shell 0.17 improvements + MELPA

1w
LobstersL

From Logs to Insights: How Product Teams Use OpenSearch Every Single Day

1w
HackerNoonH

Defeating KASLR by Doing Nothing at All

1w
LobstersL

Learning to read Arthur Whitney's C to become Smart

1w
LobstersL

Comparing Efficiency Strategies for LLM Deployment and Summarizing PowerInfer‑2’s Impact

1w
HackerNoonH

Performance Evaluation of PowerInfer‑2: Offloading, Prefill, and In‑Memory Efficiency

1w
HackerNoonH

How PowerInfer‑2 Turns Your Smartphone Into an AI Workstation

1w
HackerNoonH

The fetch()ening

1w
LobstersL

RDSEED Failure on AMD “Zen 5” Processors

1w
LobstersL

State of Terminal Emulators in 2025: The Errant Champions

1w
LobstersL

I Built My Own Google Drive

1w
LobstersL

Python steering council accepts lazy imports

2w
Welcome to LWN.net [LWN.net]W

Why Log Semantics Matter More Than Sequence Data in Detecting Anomalies

2w
HackerNoonH

Transformer Models Outperform Traditional Algorithms in Log Anomaly Detection

2w
HackerNoonH

How Transformer Models Detect Anomalies in System Logs

2w
HackerNoonH

Transformer-Based Anomaly Detection Using Log Sequence Embeddings

2w
HackerNoonH

An Overview of Log-Based Anomaly Detection Techniques

2w
HackerNoonH

A Transformer Approach to Log-Based Anomaly Detection

2w
HackerNoonH

[$] An explicit thread-safety proposal for Python

2w
Welcome to LWN.net [LWN.net]W

"You Don't Need Kafka, Just Use Postgres" Considered Harmful

2w
LobstersL

The Observability Debt Hypothesis: Why Perfect Dashboards Still Mask Failing Systems

2w
HackerNoonH

Meet Cwallet: HackerNoon Company of the Week

2w
HackerNoonH

We found an embedding indexing bottleneck in JSON parsing

2w
LobstersL

npm's New Token Limits Won't Stop the Attacks That Actually Happen

2w
HackerNoonH

On Designing Low-Latency Systems for High-Traffic Environments

2w
HackerNoonH

CHERIoT 1.0 Released

2w
LobstersL

Why Trust, Not Hype, Defines the Future of Web3 Projects

2w
HackerNoonH

The HackerNoon Newsletter: Fortune Folly (11/3/2025)

2w
HackerNoonH

Can ChatGPT Outperform the Market? Week 14

2w
HackerNoonH

LangChain vs LangGraph: A Beginner’s Guide to Building Smarter AI Workflows

2w
HackerNoonH

Devuan 6.0 released

2w
Welcome to LWN.net [LWN.net]W

[$] Namespace reference counting and listns()

2w
Welcome to LWN.net [LWN.net]W

CAST(x AS STRING) casts to integer in SQLite

2w
LobstersL

How Indra Energy Brings a ‘Startup Mindset’ to the Utility Grid

2w
HackerNoonH

A new kernel port — to WebAssembly

2w
Welcome to LWN.net [LWN.net]W

Build Native-Like Bottom Sheets with CSS Scroll Snap

2w
HackerNoonH

C++ move semantics from scratch (2022)

2w
LobstersL

How Pain Can Help Explain AI Sentience

2w
HackerNoonH

Byrrgis Founder: "Mass Adoption Won't Happen Until We Fix These DeFi Problems

2w
HackerNoonH

Prefer boring technology

2w
LobstersL

Security updates for Monday

2w
Welcome to LWN.net [LWN.net]W

Announcing cgp-serde: A modular serialization library for Serde powered by Context-Generic Programming

2w
LobstersL

A Soiree into Symbols in Ruby

2w
LobstersL

a11y.css

2w
LobstersL

IoMT Vulnerabilities Putting Patient Health Data at Risk

2w
HackerNoonH

From Blockchains to Biotech: How Miners Could Help Discover New Medicines

2w
HackerNoonH
More →

Entries updated Nov 17, 2025 09:08:35 AM PST

Questions? Suggestions? alex@sumi.news