sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Tue Dec 23

Nested Code Fences in Markdown

1d
LobstersL

How Static Analysis Can Expose Personal Data Hidden in Source Code

1d
HackerNoonH

EmuDevz: A game about building emulators

1d
LobstersL

Tracing Personal Data Through APIs

1d
HackerNoonH

Dash's 12-year journey: How One Cryptocurrency Outlasted Thousands That Launched Alongside It

1d
HackerNoonH

Building a Blog in Gleam

1d
LobstersL

Real programming vs. interviews: A dyslexic perspective

1d
LobstersL

Faster horses, not trains

1d
LobstersL

Automating Privacy Code Reviews by Mapping How Software Handles Personal Data

1d
HackerNoonH

Reducing Privacy Code Review Overhead With Privacy-Relevant Methods

1d
HackerNoonH

An introduction to XET, Hugging Face's storage system (part 1)

1d
LobstersL

The TechBeat: Best HR Software For Midsize Companies in 2026 (1/21/2026)

1d
HackerNoonH

Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact

1d
HackerNoonH

Escaping the jQuery Trap: How Django 6 Partials Let You Delete Your Frontend Code

1d
HackerNoonH

The Design Documentation No One Asks For (But Everyone Needs)

1d
HackerNoonH

Why My "Spectacular" Churn Model Failed—And How AI Saved It

1d
HackerNoonH

4 Surprising Ways Your API Gateway Can Handle Generative AI

1d
HackerNoonH

Why Specs Beat Vibes: The Next Step in AI-Native Engineering

1d
HackerNoonH

The Practical Way for Developers to Learn Algorithms

1d
HackerNoonH

JWT vs Sessions Is the Wrong Debate

1d
HackerNoonH

LaTeX Isn’t Just for Academics—It’s a Power Tool for Novelists

1d
HackerNoonH

How to Use Propensity Score Matching to Measure Down Stream Causal Impact of an Event

1d
HackerNoonH

C++ Exceptions, Explained from First Principles (and Assembly)

1d
HackerNoonH

What Comes After the AI Bubble

1d
HackerNoonH

Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifying

1d
HackerNoonH

Rethinking LLM Security: Secret Knowledge Defenses

1d
HackerNoonH

AI Assistants and the Drift Into Dependency

1d
HackerNoonH

I got into an argument on Discord about how inefficient CBR/CBZ is, so I wrote a new file format

1d
LobstersL

Why not tail recursion?

1d
LobstersL

Building a javascript runtime in one month

1d
LobstersL

The Highlighter Is Lying to You: Engineering "Sticky" Knowledge With AI

2d
HackerNoonH

Brand Community Platforms: The Secret to Customer Retention

2d
HackerNoonH

Dash's 12-year journey: How one cryptocurrency outlasted thousands that launched alongside it.

2d
HackerNoonH

Ryabitsev: Tracking kernel development with korgalore

2d
Welcome to LWN.net [LWN.net]W

Designing a service with IndieAuth and email-based login

2d
LobstersL

I Made Zig Compute 33 Million Satellite Positions in 3 Seconds. No GPU Required

2d
LobstersL

On coding with LLMs

2d
LobstersL

Remote authentication bypass in telnetd

2d
Welcome to LWN.net [LWN.net]W

Deep learning as program synthesis

2d
LobstersL

How would software look if hardware had stopped improving long ago?

2d
LobstersL

Little Sound Dj

2d
LobstersL

Building Critical Infrastructure with htmx: Network Automation for the Paris 2024 Olympics

2d
LobstersL

Where I'm at with AI

2d
LobstersL

Reliable Signals of Honest Intent

2d
LobstersL

Building Your Own Efficient uint128 in C++

2d
LobstersL

Mozilla introduces Firefox Nightly RPM package repository

2d
Welcome to LWN.net [LWN.net]W

RecomendeMe Earns a 56 Proof of Usefulness Score by Building a Human-First Recommendation Platform

2d
HackerNoonH

The Long Now of the Web: Inside the Internet Archive’s Fight Against Forgetting

2d
LobstersL

How I Built a Churn Prediction System That My Colleagues Actually Used

2d
HackerNoonH

Visualizing Delaunay Triangulation (2022)

2d
LobstersL
More →

Entries updated Jan 22, 2026 04:57:30 PM PST

Questions? Suggestions? alex@sumi.news