sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Fri Feb 13
The World Model Problem: Why Sora-Style Video Still Breaks
22h
H
How I Built a Cache-First Azure Maps Integration
22h
H
How Playnance Is Using KGeN's 53 Million Gamers to Quietly Reshape Web3 Distribution
22h
H
Kernel prepatch 7.0-rc4
22h
W
rack-mount hydroponics
23h
L
I let Claude Code configure my Arch install
1d
L
C++26: The Oxford variadic comma
1d
L
A Sane Directory Structure for Software Projects
1d
L
A Linux distribution designed to eliminate single points of failure
1d
L
Codegen is not productivity
1d
L
The HackerNoon Newsletter: Its Not Kubernetes. It Never Was. (3/15/2026)
1d
H
Go 1.21: An Inside Look at Forward Compatibility and Toolchain Management
1d
H
Separating the Wayland Compositor and Window Manager
1d
L
Snail Mail Sign-Ups
1d
L
LLM time
1d
L
A most elegant TCP hole punching algorithm
1d
L
Mass-Produced Software Components
1d
L
One hundred curl graphs
1d
L
The Optimization Ladder
1d
L
Gothub is live
1d
L
Survival in the North
1d
H
Mount Mayhem at Netflix: Scaling Containers on Modern CPUs
1d
L
Summary - Rust Project Perspectives on AI
1d
L
The TechBeat: Google Gemini vs Anthropic Claude vs OpenAI ChatGPT vs xAI Grok: The Ultimate Comparison (3/15/2026)
1d
H
Changes to OpenTTD distribution on Steam
1d
L
A Gentle Introduction to Mercury
1d
L
LotusNotes
1d
L
tree-style invite systems reduce AI slop
1d
L
StorageReview Sets New Pi Record: 314 Trillion Digits on a Dell PowerEdge R7725
1d
L
Ageless Linux — Software for Humans of Indeterminate Age
1d
L
Rebuilding CRM Truth From Noisy Events
1d
H
Hope Is Not a Strategy in Fintech
1d
H
54kb minecraft clone made without a graphics library
1d
L
Firecrawl First, Bing Second: A Safer Way to Enrich Company Data
1d
H
A Preview of Coalton 0.2
2d
L
Fedora 44 on the Raspberry Pi 5
2d
L
CFG Tree Enumeration: A Simple Integer-Based Bijection Algorithm
2d
H
Lies I was Told About Collaborative Editing, Part 2: Why we don't use Yjs
2d
L
JPEG compression
2d
L
Sunsetting Jazzband
2d
L
Companies House vulnerability enabled company hijacking
2d
L
Humanities in the Machine
2d
L
Thoughts on generative A.I
2d
L
Godot 4.3 RC 2: The Safe Fixes
2d
H
How to Seed a Cloud
2d
L
Developing a 2FA Desktop Client in Go
2d
L
Fatal Core Dump (a debugging murder mystery played with GDB)
2d
L
The HackerNoon Newsletter: Enids Dream: A Sentient Robot? (3/14/2026)
2d
H
How to Master Any Skill: Explaining the Biological Shortcut
2d
H
Why Mathematica does not simplify Sinh[ArcCosh[x]]
2d
L
More →