sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Oct 20
JVM exceptions are weird: a decompiler perspective
2w
L
A Comparative Review of Open‑World, Closed‑World, and Captioning Methods for Video Segmentation
2w
H
See, Track, Describe: How OW‑VISCap Lets AI Tell the Story Behind Every Frame
2w
H
The TechBeat: Elaborate Hoaxes in the Age of AI (11/4/2025)
2w
H
I want a good parallel language [video]
2w
L
Why Engineers Can't Be Rational About Programming Languages
2w
L
What laptops are Lobsters rocking in 2025?
2w
L
The Data Migration Tax: Paying Interest on the Myth of 3-2-1
2w
H
“It Works on my Machine” Isn’t an Excuse—Test Your README Like a User
2w
H
Inside the ve(3,3) Engine for DEXs: A New Model for Sustainable Liquidity
2w
H
Deploying MobileNetV3 on NXP i.MX8MP: A Complete Edge AI Workflow for Handwritten Digit Recognition
2w
H
The Multi-Agent AI Revolution: Why Your Next Enterprise System Should Be Serverless
2w
H
Beyond Data: The Rising Need for AI Security
2w
H
I Built a Press Release AI Prompt That Journalists Actually Read—Here's the Complete System
2w
H
UAE's Bitcoin Mining Breakthrough - The Opportunity Tonga Missed (But Can Still Seize)
2w
H
WebAssembly arch support for the Linux kernel
2w
L
Holography Light: Justification and Future Theory
2w
H
Non-Fermi Liquids: Diverse NFL Scaling Behaviors
2w
H
Rapid Prototyping with AI: A Casual Conversation about Ideas, Experiments, and Reality Checks
2w
H
Free software scares normal people
2w
L
How to Deal With A Diverged Git Repository: A Guide
2w
H
Defeating KASLR by Doing Nothing at All (Project Zero)
2w
W
Bluetui - A TUI for managing bluetooth on Linux
2w
L
Your AI Co-Pilot Needs a Human Boss: Building a Real Human-in-the-Loop Workflow for Logistics
2w
H
3 Experiments That Reveal the Shocking Inner Life of AI Introduction: Is Anybody Home?
2w
H
agent-shell 0.17 improvements + MELPA
2w
L
From Logs to Insights: How Product Teams Use OpenSearch Every Single Day
2w
H
Defeating KASLR by Doing Nothing at All
2w
L
Learning to read Arthur Whitney's C to become Smart
2w
L
Comparing Efficiency Strategies for LLM Deployment and Summarizing PowerInfer‑2’s Impact
2w
H
Performance Evaluation of PowerInfer‑2: Offloading, Prefill, and In‑Memory Efficiency
2w
H
How PowerInfer‑2 Turns Your Smartphone Into an AI Workstation
2w
H
The fetch()ening
2w
L
RDSEED Failure on AMD “Zen 5” Processors
2w
L
State of Terminal Emulators in 2025: The Errant Champions
2w
L
I Built My Own Google Drive
2w
L
Python steering council accepts lazy imports
2w
W
Why Log Semantics Matter More Than Sequence Data in Detecting Anomalies
2w
H
Transformer Models Outperform Traditional Algorithms in Log Anomaly Detection
2w
H
How Transformer Models Detect Anomalies in System Logs
2w
H
Transformer-Based Anomaly Detection Using Log Sequence Embeddings
2w
H
An Overview of Log-Based Anomaly Detection Techniques
2w
H
A Transformer Approach to Log-Based Anomaly Detection
2w
H
[$] An explicit thread-safety proposal for Python
2w
W
"You Don't Need Kafka, Just Use Postgres" Considered Harmful
2w
L
The Observability Debt Hypothesis: Why Perfect Dashboards Still Mask Failing Systems
2w
H
Meet Cwallet: HackerNoon Company of the Week
2w
H
We found an embedding indexing bottleneck in JSON parsing
2w
L
npm's New Token Limits Won't Stop the Attacks That Actually Happen
2w
H
On Designing Low-Latency Systems for High-Traffic Environments
2w
H
More →