sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat Oct 25
Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3]
6d
H
Rebuilding the Enterprise Brain: Olivier Khatib’s AI Plan to Make ERPs Intelligent Again
6d
H
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
6d
H
Security updates for Wednesday
6d
W
What Makes the Intro to Crafting Interpreters so Good?
6d
L
Physiognomy as Morphological Ontology: Toward the Rehabilitation of a Discredited Discipline
6d
H
Why Every AI Product Needs an Impact Assessment Before Deployment
6d
H
Hachi: An Image search engine
6d
L
The lost cause of the Lisp machines
6d
L
Spotify Study Flags Key Limits in Measuring Information Flow in Code Reviews
6d
H
Spotify Study Maps How Information Spreads Through Code Reviews
6d
H
How Code Reviews Function as Communication Networks in Modern Software Teams
6d
H
Researchers Test Long-Held Theory: Do Code Reviews Truly Act as Communication Networks?
6d
H
Researchers Push for Pre-Submit Security to Reduce Android Code Flaws
6d
H
New Crypto Mutuum Finance (MUTM) Raises Over $19M Ahead of Q4 2025 V1 Protocol Release
6d
H
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
6d
H
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
6d
H
Static Web Hosting on the Intel N150: FreeBSD, SmartOS, NetBSD, OpenBSD and Linux Compared
6d
L
Introducing Apache Fory™ Rust: A Versatile Serialization Framework for the Modern Age
6d
L
New Study Shows Random Forest Models Can Spot 80% of Vulnerabilities Before Code Merge
6d
H
When high availability brings downtime
6d
L
Study Shows Android Vulnerabilities Can Take Up to 5 Years to Fully Fix
6d
H
The TechBeat: Court Finds OpenAI in Violation of German Copyright Law, Orders Damages (11/19/2025)
6d
H
Inside the Data Pipeline Behind Classifying Android Security Flaws
6d
H
How Lightweight ML Models Predict Vulnerable Code Changes
6d
H
Improving NAT traversal, part 2: challenges in cloud environments
6d
L
Cloudflare outage on November 18, 2025
6d
L
Security Is A Practice, Not A One-Time Project
6d
H
The Post-Hype Playbook: Unhashed CEO Mia P on Marketing Web3 Credibility
6d
H
The Complete Guide to Creating Your Ideal Customer Profile (With Canva Example)
6d
H
Building Ultra-Fast APIs with Spring Boot 3.2 and Redis Caching
6d
H
European Commission Investigates Amazon, Microsoft Cloud Services Under DMA
6d
H
AI Can Fix the 5 Biggest Breakpoints in M&A Diligence: Here's How
6d
H
An actor-model multi-core scheduler for OCaml 5
6d
L
Experiment: making TypeScript immutable-by-default
6d
L
A Month of Chat-Oriented Programming
6d
L
Self-hosting DNS for no fun, but a little profit
6d
L
'Vibe Coding' Is Now In The Collins Dictionary - But What About 'Technical Debt'?
6d
H
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough
6d
H
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security In 2026
6d
H
Better DOM Morphing with Morphlex
6d
L
crux: Cross-platform app development in Rust
6d
L
Blender 5.0 released
6d
W
A surprise with how '#!' handles its program argument in practice
1w
L
A Developer’s Guide to Building Next-Gen Smart Wallets with ERC-4337 — Part 1: The EntryPoint
1w
H
Classifier-Based VP System Targets High-Risk Code Changes in Upstream Projects
1w
H
Machine Learning-based Vulnerability Protections For Android Open Source Project
1w
H
Pebble, Rebble, and a Path Forward
1w
L
Future MLLMs: Contribution of MIL-Based Techniques and Enriched Visual Signals
1w
H
MIVPG on E-commerce: Multi-Image/Multi-Patch Aggregation for Captioning
1w
H
More →