sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Wed Oct 22
Mt. Gox & Silk Road: How Bitcoin’s Wild Childhood Shaped our Present
2d
H
Questions for Cloudflare
2d
L
Enhancing Long-Tailed Segmentation with Gradient Cache and BSGAL
2d
H
Why BSDs?
2d
L
Cross-Model Validation: MIVPG's Efficacy on Encoder-Decoder vs. Decoder-Only LLMs
2d
H
Inside a global campaign hijacking open-source project identities
2d
L
Specialized CSV readers for Rust leveraging hybrid SIMD techniques
2d
L
[$] Debian debates amending architecture support stratagem
2d
W
Postmortem of the Xubuntu.org download site compromise
2d
W
Theoretical Proof: CSA Module Maintains MIL Properties
2d
H
The HackerNoon Newsletter: Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3] (11/19/2025)
2d
H
Visual Prompt Generation: Cross-Attention in Q-Former
2d
H
GStreamer Conference 2025 video recordings now available
2d
W
Making Tech Human: How to Stay Curious in a Digital World
2d
H
vibesdk: An open-source vibe coding platform that helps you build your own vibe-coding platform, built entirely on Cloudflare stack
2d
L
We should rename .unwrap() to .or_panic()
2d
L
Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3]
2d
H
Rebuilding the Enterprise Brain: Olivier Khatib’s AI Plan to Make ERPs Intelligent Again
2d
H
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
2d
H
Security updates for Wednesday
2d
W
What Makes the Intro to Crafting Interpreters so Good?
2d
L
Physiognomy as Morphological Ontology: Toward the Rehabilitation of a Discredited Discipline
2d
H
Why Every AI Product Needs an Impact Assessment Before Deployment
2d
H
Hachi: An Image search engine
2d
L
The lost cause of the Lisp machines
2d
L
Spotify Study Flags Key Limits in Measuring Information Flow in Code Reviews
2d
H
Spotify Study Maps How Information Spreads Through Code Reviews
2d
H
How Code Reviews Function as Communication Networks in Modern Software Teams
2d
H
Researchers Test Long-Held Theory: Do Code Reviews Truly Act as Communication Networks?
2d
H
Researchers Push for Pre-Submit Security to Reduce Android Code Flaws
2d
H
New Crypto Mutuum Finance (MUTM) Raises Over $19M Ahead of Q4 2025 V1 Protocol Release
2d
H
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
2d
H
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
2d
H
Static Web Hosting on the Intel N150: FreeBSD, SmartOS, NetBSD, OpenBSD and Linux Compared
3d
L
Introducing Apache Fory™ Rust: A Versatile Serialization Framework for the Modern Age
3d
L
New Study Shows Random Forest Models Can Spot 80% of Vulnerabilities Before Code Merge
3d
H
When high availability brings downtime
3d
L
Study Shows Android Vulnerabilities Can Take Up to 5 Years to Fully Fix
3d
H
The TechBeat: Court Finds OpenAI in Violation of German Copyright Law, Orders Damages (11/19/2025)
3d
H
Inside the Data Pipeline Behind Classifying Android Security Flaws
3d
H
How Lightweight ML Models Predict Vulnerable Code Changes
3d
H
Improving NAT traversal, part 2: challenges in cloud environments
3d
L
Cloudflare outage on November 18, 2025
3d
L
Security Is A Practice, Not A One-Time Project
3d
H
The Post-Hype Playbook: Unhashed CEO Mia P on Marketing Web3 Credibility
3d
H
The Complete Guide to Creating Your Ideal Customer Profile (With Canva Example)
3d
H
Building Ultra-Fast APIs with Spring Boot 3.2 and Redis Caching
3d
H
European Commission Investigates Amazon, Microsoft Cloud Services Under DMA
3d
H
AI Can Fix the 5 Biggest Breakpoints in M&A Diligence: Here's How
3d
H
An actor-model multi-core scheduler for OCaml 5
3d
L
More →