sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Dec 30
I Built a "Baby Algorithm" to Cure My Decision Fatigue (And Save My Relationship)
3d
H
The Age of the Lobster: A Chronicle of the Agentic Revolution (2023–2026)
3d
H
The Price of Freedom Pt. 2
3d
H
Getting High-Quality Output from 7B Models: A Production-Grade Prompting Playbook
3d
H
Hallucination Stations: On Some Basic Limitations of Transformer-Based Language Models
3d
L
The Case for Bigger Models in Human Motion AI
3d
H
Generalized Kuramoto Models: Dynamics on Manifolds, Lie Groups, and Spheres
3d
H
Solving Non-Convex HSVMs via Semidefinite Relaxation (SDP)
3d
H
sra-archive: Very simple random access archive format
3d
L
Kuramoto Models on Higher-Dimensional Manifolds: Geometric Riccati Matrix ODEs
3d
H
India's AQI Crisis: Can AI Be Used to Solve It?
3d
H
Microsoft obeys court orders to provide Windows BitLocker recovery keys
3d
L
prolog-blog-engine: blog engine in pure Prolog. 0 dependencies, Markdown, server
3d
L
AI Coding Tip 004 - Why You Should Use Modular Skills
3d
H
ChronDB: Transforming a Clojure Database into a Polyglot Library with GraalVM Native Image and FFI
3d
L
Simplify Your Code: Functional Core, Imperative Shell
3d
L
Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission
3d
L
Home Lab Developments
3d
L
Godot 4.6 Release: It's all about your flow
3d
L
JuiceSSH - Give me my pro features back
3d
L
[$] Fedora and GPG 2.5
3d
W
The state of Linux music players in 2026
3d
L
Fedora Asahi Remix is now working on Apple M3
3d
L
Stenberg: The end of the curl bug-bounty program
3d
W
The HackerNoon Newsletter: Can ChatGPT Outperform the Market? Week 26 (1/26/2026)
3d
H
Porting DOOM to my WebAssembly VM
3d
L
In Conversation With Maheshwar Gourishetti: Architecting Enterprise Performance Management Solutions
3d
H
The Intent Envelope: Proofs for Completeness, Not Just Soundness
3d
L
Meet Beldex: HackerNoon Company of the Week
3d
H
Sudarshan Venkataraman on Engineering the Nervous System of High-Assurance Autonomy
3d
H
Swift Concurrency: Part 3 — Bridging Legacy APIs with Continuations
3d
H
How Akshatha Madapura Anantharamu Is Building Trustworthy Interfaces for AI Systems
3d
H
In Conversation With Naveen Srikakulam: Transforming Strategy Through Data-Driven Innovation
3d
H
OWASP Top 10: The Security Stuff You Keep Meaning to Learn
3d
H
Reversing abstractions: an existential crisis
3d
L
Inside Neuralink’s Technology Architecture: Hype or Near-Term Reality?
3d
H
Security updates for Monday
3d
W
Can ChatGPT Outperform the Market? Week 26
3d
H
McCLIM and 7GUIs - Part 1: The Counter
3d
L
What are you doing this week?
3d
L
Implementing the transcendental functions in Ivy
3d
L
MongoDB vs ScyllaDB: Architecture Comparison
3d
H
Android OS Architecture, Part 5: The Zygote Process
3d
H
How Mixin Built a $1 Trillion Volume Crypto Wallet That Prioritizes Privacy Over Profit
3d
H
Check my extension for make tab chaos manageable in Chrome
3d
L
Why “Obvious” Performance Optimizations Often Backfire: Lessons From Systems Serving 50M+ Requests
3d
H
Long branches in compilers, assemblers, and linkers
3d
L
Announcing MapLibre Tile: a modern and efficient vector tile format
3d
L
Apple, What Have You Done?
3d
L
The end of the curl bug-bounty
4d
L
More →