sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Mar 2
CVE-2026-33017: Unauthenticated RCE in Langflow’s Public Flow Endpoint Explained
1w
H
Optimization lessons from a Minecraft structure locator
1w
L
How to Start a Video Streaming Business and Monetize It
1w
H
CESIL and other programming languages
1w
L
Hashed Invests in GCC's First Collectibles Grading & Authentication Company "HiT"
1w
H
Deploying Go Apps to Google Cloud Run
1w
L
Why a Simple QR Code Could Fix a Huge Accessibility Gap for Deaf People
1w
H
Model Poisoning Turns Helpful AI Into a Trojan Horse
1w
H
This Cheap OTG Hack Made My Phone Feel Like a PC
1w
H
The Missing Layer in AI Reliability: Replayable Requests
1w
H
A 56,000-Star AI App Shipped With a Textbook SQL Injection Flaw
1w
H
This Perplexity Embedding Model Understands Chunks in Context
1w
H
Wealth Is Moving Beyond London, New York, and Zurich
1w
H
The Synthetic Web Could Break AI From Within
1w
H
MCP Is Dead. The CLI Is Winning the AI Agent Stack
1w
H
Engineers do get promoted for writing simple code
1w
L
Luxury’s Lost Decade Begins as 50 Million Shoppers Exit the Market
1w
H
NVIDIA’s Nemotron-3 Super 120B FP8 Targets Agentic Workflows at Scale
1w
H
NVIDIA Nemotron-3 Super 120B Targets Agentic AI at Scale
1w
H
4 Tactics for Shipping Faster Without Losing Software Quality
1w
H
How to Break Your PostgreSQL IIoT Database and Learn Something in the Process
1w
H
Why Enterprises Choose PySpark for Real-Time Big Data Analytics
1w
H
Hidden Truth
1w
H
What the Strangler Fig Pattern Teaches Us About Modernizing Legacy Software
1w
H
Gateway Security Won’t Be Enough for MCP-Powered AI
1w
H
Fish Audio’s S2-Pro Brings Emotion Tags to Text-to-Speech
1w
H
Fedora moving from Pagure to Forgejo
1w
L
This 4B Safety Model Classifies AI Content as Safe, Unsafe, or Controversial
1w
H
Phase 2 Calibration: Fixing Gating and Reward Scoring Together
1w
H
Why CIC Private Debt’s Risk Hire Matters More Than It Looks
1w
H
Node.js — Developing a minimally HashDoS resistant, yet quickly reversible integer hash for V8
1w
L
Large-scale online deanonymization with LLMs
1w
L
Lines of code are useful
1w
L
Vim Racing
1w
L
Zero-copy protobuf and ConnectRPC for Rust
1w
L
A Verilog to Factorio compiler and simulator (working RISC-V CPU)
1w
L
Electric Motorcycles are a Security Nightmare
1w
L
Read Receipts: An iMessage Simulator
1w
L
[$] LWN.net Weekly Edition for March 26, 2026
1w
W
vim-classic: Long-term maintenance of Vim 8.x
1w
L
Shell Tricks That Actually Make Life Easier (And Save Your Sanity)
1w
L
No More Silent Analytics Bugs: All it Takes is One SDK and One Github Action
1w
H
Qwen3.5-9b-uncensored-hauhaucs-Aggressive Model: A Beginner's Guide to Get You Started
1w
H
Updates to GitHub Copilot interaction data usage policy
1w
L
One File - What if your lockfile and your package list were the same file?
1w
L
Apple’s macOS UNIX certification is a lie (2025)
1w
L
Which Design Doc Did a Human Write?
1w
L
The Cost of Concurrency Coordination
1w
L
Thoughts on slowing the fuck down
1w
L
[$] Collaboration for battling security incidents
1w
W
More →