sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Wed Oct 22
How Figment and OpenTrade Created a 15% Stablecoin Yield Product Without DeFi Risk
2d
H
The Boredom Paradox: How Risk-Averse Engineering Built the Internet's Most Resilient Companies
2d
H
10 Marketing Moves Tech Companies Can't Afford to Skip Before 2026
2d
H
How RAG Improves Database Management
2d
H
Adventures in upgrading Proxmox
2d
L
From GANs to Diffusion: GDA for Perception Tasks
2d
H
Mt. Gox & Silk Road: How Bitcoin’s Wild Childhood Shaped our Present
2d
H
Questions for Cloudflare
2d
L
Enhancing Long-Tailed Segmentation with Gradient Cache and BSGAL
2d
H
Why BSDs?
3d
L
Cross-Model Validation: MIVPG's Efficacy on Encoder-Decoder vs. Decoder-Only LLMs
3d
H
Inside a global campaign hijacking open-source project identities
3d
L
Specialized CSV readers for Rust leveraging hybrid SIMD techniques
3d
L
[$] Debian debates amending architecture support stratagem
3d
W
Postmortem of the Xubuntu.org download site compromise
3d
W
Theoretical Proof: CSA Module Maintains MIL Properties
3d
H
The HackerNoon Newsletter: Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3] (11/19/2025)
3d
H
Visual Prompt Generation: Cross-Attention in Q-Former
3d
H
GStreamer Conference 2025 video recordings now available
3d
W
Making Tech Human: How to Stay Curious in a Digital World
3d
H
vibesdk: An open-source vibe coding platform that helps you build your own vibe-coding platform, built entirely on Cloudflare stack
3d
L
We should rename .unwrap() to .or_panic()
3d
L
Clean Code: Interfaces in Go - Why Small Is Beautiful [Part 3]
3d
H
Rebuilding the Enterprise Brain: Olivier Khatib’s AI Plan to Make ERPs Intelligent Again
3d
H
Data Platform as a Service: A Three-Pillar Model for Scaling Enterprise Data Systems
3d
H
Security updates for Wednesday
3d
W
What Makes the Intro to Crafting Interpreters so Good?
3d
L
Physiognomy as Morphological Ontology: Toward the Rehabilitation of a Discredited Discipline
3d
H
Why Every AI Product Needs an Impact Assessment Before Deployment
3d
H
Hachi: An Image search engine
3d
L
The lost cause of the Lisp machines
3d
L
Spotify Study Flags Key Limits in Measuring Information Flow in Code Reviews
3d
H
Spotify Study Maps How Information Spreads Through Code Reviews
3d
H
How Code Reviews Function as Communication Networks in Modern Software Teams
3d
H
Researchers Test Long-Held Theory: Do Code Reviews Truly Act as Communication Networks?
3d
H
Researchers Push for Pre-Submit Security to Reduce Android Code Flaws
3d
H
New Crypto Mutuum Finance (MUTM) Raises Over $19M Ahead of Q4 2025 V1 Protocol Release
3d
H
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
3d
H
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
3d
H
Static Web Hosting on the Intel N150: FreeBSD, SmartOS, NetBSD, OpenBSD and Linux Compared
3d
L
Introducing Apache Fory™ Rust: A Versatile Serialization Framework for the Modern Age
3d
L
New Study Shows Random Forest Models Can Spot 80% of Vulnerabilities Before Code Merge
3d
H
When high availability brings downtime
3d
L
Study Shows Android Vulnerabilities Can Take Up to 5 Years to Fully Fix
3d
H
The TechBeat: Court Finds OpenAI in Violation of German Copyright Law, Orders Damages (11/19/2025)
3d
H
Inside the Data Pipeline Behind Classifying Android Security Flaws
3d
H
How Lightweight ML Models Predict Vulnerable Code Changes
3d
H
Improving NAT traversal, part 2: challenges in cloud environments
3d
L
Cloudflare outage on November 18, 2025
3d
L
Security Is A Practice, Not A One-Time Project
3d
H
More →