sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Nov 3
How RAG Improves Database Management
2w
H
Adventures in upgrading Proxmox
2w
L
From GANs to Diffusion: GDA for Perception Tasks
2w
H
Mt. Gox & Silk Road: How Bitcoin’s Wild Childhood Shaped our Present
2w
H
Questions for Cloudflare
2w
L
Enhancing Long-Tailed Segmentation with Gradient Cache and BSGAL
2w
H
Why BSDs?
2w
L
Cross-Model Validation: MIVPG's Efficacy on Encoder-Decoder vs. Decoder-Only LLMs
2w
H
Inside a global campaign hijacking open-source project identities
2w
L
Specialized CSV readers for Rust leveraging hybrid SIMD techniques
2w
L
[$] Debian debates amending architecture support stratagem
2w
W
Postmortem of the Xubuntu.org download site compromise
2w
W
Theoretical Proof: CSA Module Maintains MIL Properties
2w
H
The HackerNoon Newsletter: Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3] (11/19/2025)
2w
H
Visual Prompt Generation: Cross-Attention in Q-Former
2w
H
GStreamer Conference 2025 video recordings now available
2w
W
Making Tech Human: How to Stay Curious in a Digital World
2w
H
vibesdk: An open-source vibe coding platform that helps you build your own vibe-coding platform, built entirely on Cloudflare stack
2w
L
We should rename .unwrap() to .or_panic()
2w
L
Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3]
2w
H
Rebuilding the Enterprise Brain: Olivier Khatib’s AI Plan to Make ERPs Intelligent Again
2w
H
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
2w
H
Security updates for Wednesday
2w
W
What Makes the Intro to Crafting Interpreters so Good?
2w
L
Physiognomy as Morphological Ontology: Toward the Rehabilitation of a Discredited Discipline
2w
H
Why Every AI Product Needs an Impact Assessment Before Deployment
2w
H
Hachi: An Image search engine
2w
L
The lost cause of the Lisp machines
2w
L
Spotify Study Flags Key Limits in Measuring Information Flow in Code Reviews
2w
H
Spotify Study Maps How Information Spreads Through Code Reviews
2w
H
How Code Reviews Function as Communication Networks in Modern Software Teams
2w
H
Researchers Test Long-Held Theory: Do Code Reviews Truly Act as Communication Networks?
2w
H
Researchers Push for Pre-Submit Security to Reduce Android Code Flaws
2w
H
New Crypto Mutuum Finance (MUTM) Raises Over $19M Ahead of Q4 2025 V1 Protocol Release
2w
H
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
2w
H
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
2w
H
Static Web Hosting on the Intel N150: FreeBSD, SmartOS, NetBSD, OpenBSD and Linux Compared
2w
L
Introducing Apache Fory™ Rust: A Versatile Serialization Framework for the Modern Age
2w
L
New Study Shows Random Forest Models Can Spot 80% of Vulnerabilities Before Code Merge
2w
H
When high availability brings downtime
2w
L
Study Shows Android Vulnerabilities Can Take Up to 5 Years to Fully Fix
2w
H
The TechBeat: Court Finds OpenAI in Violation of German Copyright Law, Orders Damages (11/19/2025)
2w
H
Inside the Data Pipeline Behind Classifying Android Security Flaws
2w
H
How Lightweight ML Models Predict Vulnerable Code Changes
2w
H
Improving NAT traversal, part 2: challenges in cloud environments
2w
L
Cloudflare outage on November 18, 2025
2w
L
Security Is A Practice, Not A One-Time Project
2w
H
The Post-Hype Playbook: Unhashed CEO Mia P on Marketing Web3 Credibility
2w
H
The Complete Guide to Creating Your Ideal Customer Profile (With Canva Example)
2w
H
Building Ultra-Fast APIs with Spring Boot 3.2 and Redis Caching
2w
H
More →