sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Nov 24
How TIKTAG Attacks Slip Past ARM’s Memory Tagging Defenses
21h
H
How JPEG Screenshots Defeated Our Beautiful H.264 WebCodecs Pipeline
21h
L
Nostr Compass #1
22h
L
Querying and Ingest issues in EU
22h
L
Wayback 0.3 Released
22h
L
(My) Second Year of the Linux Desktop (For Gaming)
22h
L
A curl 2025 review
23h
L
How Jay’s Research Is Reshaping AI-Driven Test Automation for Secure Cloud Systems
23h
H
cjanet
1d
L
Can ChatGPT Outperform the Market? Week 21
1d
H
ZipPop: a space conserving unzipping script
1d
L
Swanky Python: Interactive development for Python
1d
L
How and why I moved from Apple Services to my own server
1d
L
"AI" is bad UX
1d
L
[$] A 2025 retrospective
1d
W
The HackerNoon Newsletter: The 2026 Crypto Trends Staying Out of the Spotlight (12/24/2025)
1d
H
My 2026 Open Social Web Predictions
1d
L
The Year in Marketing: What You Need to Read Before 2026
1d
H
Nix State of the SBOM
1d
L
Just in time software
1d
L
[$] What's new in systemd v259
1d
W
How Compliance Requirements Shape Modern Software Architecture
1d
H
Security updates for Wednesday
1d
W
I'm returning my Framework 16
1d
L
'Twas the Night Before Deploy: A Blind Architect’s Chess Engine Journey
1d
H
tygor: Type-safe backend for Go + TypeScript apps
1d
L
Liquidity Providers Face a Trade-Off Between Fees and Loss in Concentrated AMMs
1d
H
Avoid mini-frameworks
1d
L
Implementation of optimized vector of strings in C++ in SumatraPDF
1d
L
FreeBSD: Installation on a ThinkPad X200 Tablet in 2025
1d
L
Why Hardware Memory Tagging Isn’t the Security Silver Bullet It Promised to Be
1d
H
A Couple 3D AABB Tricks
1d
L
Why Optimal Liquidity Provision Breaks Down in Discrete Blockchain Markets
1d
H
Study Details Practical Attacks That Bypass MTE Protections in Chrome and Linux
1d
H
Interactively visualize GitHub Actions Matrix configurations
1d
L
A Resilient Class of Speculative Attacks Can Leak ARM Memory Tags
1d
H
The TechBeat: Stop the Generative AI Arms Race Before It Stops Us (12/24/2025)
1d
H
ARM MTE Found Vulnerable to Speculative Tag Leakage on Pixel 8 Devices
1d
H
What the Internet Was Like in 2003
1d
L
Custom Cross Compiler with Nix
1d
L
Attention From First Principles
1d
L
Meta Is Using The Linux Scheduler Designed For Valve's Steam Deck On Its Servers
1d
L
Three A/B Testing Mistakes I Keep Seeing (And How to Avoid Them)
1d
H
The Anti-Cloud AI Manifesto: Meet “Ratio,” the DSL That Runs Game-Grade Intelligence on a Laptop
1d
H
As Coding Agents Go Mainstream, Teams Want Proof—and Metrics
1d
H
Twelve-year-old Selects His Favorite Tech and Design Picks of 2025
1d
H
This One Script Fixed the “Images Drop In Late” Problem
1d
H
30 Fast AI Income Ideas You Can Launch This Weekend
1d
H
The Day I Realized My Smart Contract Was the Bug
1d
H
Blockchain’s Bug Tax: The Neo and NBitcoin Mistakes a Linter Spotted
1d
H
More →