sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Fri Dec 26

Why does SSH send 100 packets per keystroke?

3d
LobstersL

Implementation of the Apollo Guidance Computer in an FPGA

3d
LobstersL

Dynamic GHC matrix in GitHub CI

3d
LobstersL

Learning Low-Level Computing and C++ by Making a Game Boy Emulator - The Making of GameByte

3d
LobstersL

Compiling Scheme to WebAssembly

3d
LobstersL

Exploit Cursor Agents to create persistent, distributed threats

3d
LobstersL

Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"

3d
LobstersL

We built a museum exhibit about a 1990s game hint line, with a physical binder

3d
LobstersL

Instagram Creators Should Check If Their Posts Are Being Deemed Political

3d
HackerNoonH

How to Make Your Legacy Exception-Throwing Code Compatible With Lambdas

3d
HackerNoonH

AlphaTON Launches Claude Connector Powered By TON And Telegram

3d
HackerNoonH

How to Add the AWS WAF CAPTCHA to an Angular Application

3d
HackerNoonH

remotely unlocking an encrypted hard disk with systemd initrd on Arch

3d
LobstersL

Educational Byte: What Are Fed Rates and Why Do They Affect Crypto Prices?

3d
HackerNoonH

vnccc: vnc wrapped claude code

3d
LobstersL

SSH has no Host header

3d
LobstersL

CTA Hierarchy in the Wild

3d
LobstersL

I was banned from Claude for scaffolding a CLAUDE.md file

3d
LobstersL

The Code-Only Agent

3d
LobstersL

A Protocol for Package Management

3d
LobstersL

JS Returns Undefined

3d
LobstersL

[$] Linux Kernel Runtime Guard reaches its 1.0 release

3d
Welcome to LWN.net [LWN.net]W

You CAN Average Percentiles (2016)

3d
LobstersL

The HackerNoon Newsletter: 5 Risks You Have To Take as a Leader (1/22/2026)

3d
HackerNoonH

Why Expected Value Is Not Enough in Production Trading Systems

3d
HackerNoonH

How to Advertise Your Startup the Right Way

3d
HackerNoonH

Ghost in the Wi-Fi

3d
LobstersL

Architecture for Disposable Systems

3d
LobstersL

Why “It Works” Is Often the Most Dangerous Phrase in Product Design

3d
HackerNoonH

The Problem With Perfect AI Is That Mathematics Won’t Allow It

3d
HackerNoonH

Optimization Log: How I Pushed a 2,750-Word Guide to 97/100 PageSpeed for AI Search

3d
HackerNoonH

30 years of ReactOS

3d
Welcome to LWN.net [LWN.net]W

Rust 1.93.0 released

3d
Welcome to LWN.net [LWN.net]W

Security updates for Thursday

3d
Welcome to LWN.net [LWN.net]W

Announcing Rust 1.93.0

3d
LobstersL

How Static and Hybrid Analysis Can Cut Privacy Review Effort by 95%

3d
HackerNoonH

Vibe Kanban - Orchestrate AI Coding Agents

3d
LobstersL

What 100 GitHub Projects Reveal About Personal Data in Modern Software

3d
HackerNoonH

CSLib: A Focused Effort on Formalizing Computer Science in Lean

3d
LobstersL

Agentic AI Is Forcing Organizations to Rethink How Work Is Designed

3d
HackerNoonH

RPi3 running FreeBSD 12 clocks 390 days uptime as a Radius server

3d
LobstersL

GoodJob, Solid Queue, Sidekiq, Active Job, in 2026

3d
LobstersL

Data-Driven Ranking Reveals Where Privacy Risks Actually Live in Java and JavaScript Code

3d
HackerNoonH

An adversarial coding test

3d
LobstersL

Your App Subscription Is Now My Weekend Project

3d
LobstersL

Subagents, Commands and Skills Are Converging

3d
LobstersL

From Written Off to Tech Lead: How Gowtham Reddy Kunduru Built Engineering Leadership

4d
HackerNoonH

Waiting for dawn in search: Search index, Google rulings and impact on Kagi

4d
LobstersL

The TechBeat: CodeRabbit vs Code Reviews in Kilo: Which One Is Best For You in 2026 (1/22/2026)

4d
HackerNoonH

New Research Shows 64% of Third-Party Applications Access Sensitive Data Without Authorization

4d
HackerNoonH
More →

Entries updated Jan 26, 2026 01:04:26 AM PST

Questions? Suggestions? alex@sumi.news