sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Nov 4
Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3]
2w
H
Rebuilding the Enterprise Brain: Olivier Khatib’s AI Plan to Make ERPs Intelligent Again
2w
H
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
2w
H
Security updates for Wednesday
2w
W
What Makes the Intro to Crafting Interpreters so Good?
2w
L
Physiognomy as Morphological Ontology: Toward the Rehabilitation of a Discredited Discipline
2w
H
Why Every AI Product Needs an Impact Assessment Before Deployment
2w
H
Hachi: An Image search engine
2w
L
The lost cause of the Lisp machines
2w
L
Spotify Study Flags Key Limits in Measuring Information Flow in Code Reviews
2w
H
Spotify Study Maps How Information Spreads Through Code Reviews
2w
H
How Code Reviews Function as Communication Networks in Modern Software Teams
2w
H
Researchers Test Long-Held Theory: Do Code Reviews Truly Act as Communication Networks?
2w
H
Researchers Push for Pre-Submit Security to Reduce Android Code Flaws
2w
H
New Crypto Mutuum Finance (MUTM) Raises Over $19M Ahead of Q4 2025 V1 Protocol Release
2w
H
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
2w
H
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
2w
H
Static Web Hosting on the Intel N150: FreeBSD, SmartOS, NetBSD, OpenBSD and Linux Compared
2w
L
Introducing Apache Fory™ Rust: A Versatile Serialization Framework for the Modern Age
2w
L
New Study Shows Random Forest Models Can Spot 80% of Vulnerabilities Before Code Merge
2w
H
When high availability brings downtime
2w
L
Study Shows Android Vulnerabilities Can Take Up to 5 Years to Fully Fix
2w
H
The TechBeat: Court Finds OpenAI in Violation of German Copyright Law, Orders Damages (11/19/2025)
2w
H
Inside the Data Pipeline Behind Classifying Android Security Flaws
2w
H
How Lightweight ML Models Predict Vulnerable Code Changes
2w
H
Improving NAT traversal, part 2: challenges in cloud environments
2w
L
Cloudflare outage on November 18, 2025
2w
L
Security Is A Practice, Not A One-Time Project
2w
H
The Post-Hype Playbook: Unhashed CEO Mia P on Marketing Web3 Credibility
2w
H
The Complete Guide to Creating Your Ideal Customer Profile (With Canva Example)
2w
H
Building Ultra-Fast APIs with Spring Boot 3.2 and Redis Caching
2w
H
European Commission Investigates Amazon, Microsoft Cloud Services Under DMA
2w
H
AI Can Fix the 5 Biggest Breakpoints in M&A Diligence: Here's How
2w
H
An actor-model multi-core scheduler for OCaml 5
2w
L
Experiment: making TypeScript immutable-by-default
2w
L
A Month of Chat-Oriented Programming
2w
L
Self-hosting DNS for no fun, but a little profit
2w
L
'Vibe Coding' Is Now In The Collins Dictionary - But What About 'Technical Debt'?
2w
H
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough
2w
H
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security In 2026
2w
H
Better DOM Morphing with Morphlex
2w
L
crux: Cross-platform app development in Rust
2w
L
Blender 5.0 released
2w
W
A surprise with how '#!' handles its program argument in practice
2w
L
A Developer’s Guide to Building Next-Gen Smart Wallets with ERC-4337 — Part 1: The EntryPoint
2w
H
Classifier-Based VP System Targets High-Risk Code Changes in Upstream Projects
2w
H
Machine Learning-based Vulnerability Protections For Android Open Source Project
2w
H
Pebble, Rebble, and a Path Forward
2w
L
Future MLLMs: Contribution of MIL-Based Techniques and Enriched Visual Signals
2w
H
MIVPG on E-commerce: Multi-Image/Multi-Patch Aggregation for Captioning
2w
H
More →