sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat Oct 25
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
4d
L
How ADRs Help Engineering Teams Cut Costs and Reduce Technical Debt Over Time
4d
H
Django LiveView 2.0.0
4d
L
7 of the Best SOC 2 Compliance Software Platforms in 2025
4d
H
You Can Track Code Deployments in New Relic With Laravel Commands: Here's How
4d
H
What Taylor Swift Fans Can Teach Us About Spotting AI Generated Content
4d
H
Thunderbird Pro November 2025 Update
4d
L
Racing karts on a Rust GPU kernel driver (Collabora blog)
4d
W
How to Migrate Existing Azure Functions to the .NET 8 Isolated Worker Runtime
4d
H
The HackerNoon Newsletter: 10 Marketing Moves Tech Companies Cant Afford to Skip Before 2026 (11/20/2025)
4d
H
Advanced Patterns with the Symfony Clock: MockClock, NativeClock, and More
4d
H
Final Project Report 2| Apache SeaTunnel Adds Metalake Support
4d
H
Why AI Agents Need Privacy Guardrails Before They Go Mainstream
4d
H
Open Source Developers Are Exhausted, Unpaid, and Ready to Walk Away
4d
L
I’ve been thinking about Agents and MCP all wrong
4d
L
Multilingual Isn’t Cross-Lingual: Inside My Benchmark of 11 LLMs on Mid- & Low-Resource Languages
4d
H
[$] BPF and io_uring, two different ways
4d
W
Dual booting postmarketOS and Android
4d
L
Why 25% of Bitcoin Supply Faces Quantum Threat and What QANplatform Is Doing About It
4d
H
How World Mobile Stratospheric Plans to Beam 5G From the Edge of Space
4d
H
Signal Polls: Yes, no, maybe (yes!)
4d
L
What's cooking on SourceHut? Q4 2025
4d
L
AI Is Coded Postmodernism: A Look at Bohemian Rhapsody, The Matrix, and More
4d
H
How Bestfriends Anamika Bhoyrul and Tawishi Jain Are Building the Future of Social Connection
4d
H
Security updates for Thursday
4d
W
Freer Monads, More Extensible Effects (2015)
4d
L
Make Your Data Pipelines 5X Faster with Adaptive Batching
4d
H
Goldfish Gold Launches Revolutionary Gold-Backed Stablecoin
4d
H
Seraphic Becomes The First And Only Secure Enterprise Browser Solution to Protect Electron-Based App
4d
H
The Great Data Redundancy Mirage: When "Resilient" Networks Collapse Like Dominoes
4d
H
How to Build a Winning Proposal for a Data Quality Project
4d
H
Memory is slow, Disk is fast
4d
L
Agentic Pelican on a Bicycle: Gemini 3 Pro
4d
L
ML Tool Spots 80% of Vulnerability-Inducing Commits Ahead of Time
5d
H
How Developer Credential Theft Is Fueling the Next Wave of Cyberattacks
5d
H
Numbers vs features in protocol versioning (2024)
5d
L
Context: the missing API in ruby logger
5d
L
Graphics API is irrelevant
5d
L
The TechBeat: Can 25 Superhumans Run a $100M Freight Operation? T3RA’s AI Visionary Mukesh Kumar Thinks So (11/20/2025)
5d
H
A battery included hacker's file manager with VIM inspired keybind in a single binary
5d
L
Procedurally Generating Infinite Marble Runs
5d
L
The Digital Steroid – AI + HITL+ Process Mindset
5d
H
Jonathane Ricci: Law, Perception, and Power – Why Reputation Is the New Currency
5d
H
Anbarasu Arivoli Honored with TITAN Business Award and Distinguished IT Innovator of the Year
5d
H
How Arpita Soni Is Building the Future of Intelligent, Autonomous Enterprises
5d
H
How TempAI’s Copilot Supports Sales Teams in Real Time
5d
H
RFC Hub
5d
L
50th anniversary of BITBLT
5d
L
Precise geolocation via Wi-Fi Positioning System
5d
L
The Lions Operating System
5d
L
More →