sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Wed Dec 24

How I Turned Instagram Growth Into Brand Deals Using Path Social

1d
HackerNoonH

Replacing Protobuf with Rust to go 5 times faster

1d
LobstersL

Explainer: Tree-sitter vs. LSP

1d
LobstersL

What I've learned building an agent for Renovate config (as a cautious skeptic of AI)

1d
HackerNoonH

GPTZero finds 100 new hallucinations in NeurIPS 2025 accepted papers

1d
LobstersL

llama-conductor is a router + memory store + RAG harness to force models to behave like predictable components

1d
LobstersL

The WebRacket language is a subset of Racket that compiles to WebAssembly

1d
LobstersL

Maintaining shadow branches for GitHub PRs

1d
LobstersL

The TechBeat: SeaTunnel CDC Explained: A Layman’s Guide (1/23/2026)

1d
HackerNoonH

Selectively Disabling HTTP/1.0 and HTTP/1.1

1d
LobstersL

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence

1d
HackerNoonH

When "Good Enough" UX Becomes the Most Expensive Decision You'll Ever Make

1d
HackerNoonH

SemanticGen Proves Video AI Doesn’t Need More Power—Just Better Abstractions

1d
HackerNoonH

The Game AI Problem Computers Were Never Built to Solve

1d
HackerNoonH

Exploring Quantum Machine Learning for Time Series Stock Prediction

1d
HackerNoonH

I Added CISA KEV to Vulnerability Prioritization and Coverage Jumped +413%

1d
HackerNoonH

Contract-First APIs: How OpenAPI Becomes Your Single Source of Truth

1d
HackerNoonH

Small Wins, Big Impact: Revenue & Churn Automation Secrets

1d
HackerNoonH

Low Code and No Code in 2026: The Way I Pick a Platform Without Regret

1d
HackerNoonH

The Remote Developer's Survival Guide: 10 Technical Strategies to Prevent Burnout

1d
HackerNoonH

How to Enter the Proof of Usefulness (PoU) Hackathon

1d
HackerNoonH

The Midnight Lesson Planner: How to Reclaim Your Evenings and Ignite Your Classroom

1d
HackerNoonH

Why I started a Bitcoin Education Website

1d
HackerNoonH

Geometric Deep Learning: Neural Networks in Spherical, Hyperbolic, and Non-Euclidean Spaces

1d
HackerNoonH

Why does SSH send 100 packets per keystroke?

1d
LobstersL

Implementation of the Apollo Guidance Computer in an FPGA

1d
LobstersL

Dynamic GHC matrix in GitHub CI

1d
LobstersL

Learning Low-Level Computing and C++ by Making a Game Boy Emulator - The Making of GameByte

1d
LobstersL

Compiling Scheme to WebAssembly

1d
LobstersL

Exploit Cursor Agents to create persistent, distributed threats

1d
LobstersL

Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"

1d
LobstersL

We built a museum exhibit about a 1990s game hint line, with a physical binder

1d
LobstersL

Instagram Creators Should Check If Their Posts Are Being Deemed Political

1d
HackerNoonH

How to Make Your Legacy Exception-Throwing Code Compatible With Lambdas

1d
HackerNoonH

AlphaTON Launches Claude Connector Powered By TON And Telegram

1d
HackerNoonH

How to Add the AWS WAF CAPTCHA to an Angular Application

1d
HackerNoonH

remotely unlocking an encrypted hard disk with systemd initrd on Arch

1d
LobstersL

Educational Byte: What Are Fed Rates and Why Do They Affect Crypto Prices?

1d
HackerNoonH

vnccc: vnc wrapped claude code

1d
LobstersL

SSH has no Host header

1d
LobstersL

CTA Hierarchy in the Wild

1d
LobstersL

I was banned from Claude for scaffolding a CLAUDE.md file

1d
LobstersL

The Code-Only Agent

2d
LobstersL

A Protocol for Package Management

2d
LobstersL

JS Returns Undefined

2d
LobstersL

[$] Linux Kernel Runtime Guard reaches its 1.0 release

2d
Welcome to LWN.net [LWN.net]W

You CAN Average Percentiles (2016)

2d
LobstersL

The HackerNoon Newsletter: 5 Risks You Have To Take as a Leader (1/22/2026)

2d
HackerNoonH

Why Expected Value Is Not Enough in Production Trading Systems

2d
HackerNoonH

How to Advertise Your Startup the Right Way

2d
HackerNoonH
More →

Entries updated Jan 24, 2026 08:11:21 AM PST

Questions? Suggestions? alex@sumi.news