sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Feb 26

Chaitin's constant

2d
LobstersL

Two studies in compiler optimisations

2d
LobstersL

CVE-2026-33017: Unauthenticated RCE in Langflow’s Public Flow Endpoint Explained

2d
HackerNoonH

Optimization lessons from a Minecraft structure locator

2d
LobstersL

How to Start a Video Streaming Business and Monetize It

2d
HackerNoonH

CESIL and other programming languages

2d
LobstersL

Hashed Invests in GCC's First Collectibles Grading & Authentication Company "HiT"

2d
HackerNoonH

Deploying Go Apps to Google Cloud Run

2d
LobstersL

Why a Simple QR Code Could Fix a Huge Accessibility Gap for Deaf People

2d
HackerNoonH

Model Poisoning Turns Helpful AI Into a Trojan Horse

2d
HackerNoonH

This Cheap OTG Hack Made My Phone Feel Like a PC

2d
HackerNoonH

The Missing Layer in AI Reliability: Replayable Requests

2d
HackerNoonH

A 56,000-Star AI App Shipped With a Textbook SQL Injection Flaw

2d
HackerNoonH

This Perplexity Embedding Model Understands Chunks in Context

2d
HackerNoonH

Wealth Is Moving Beyond London, New York, and Zurich

2d
HackerNoonH

The Synthetic Web Could Break AI From Within

2d
HackerNoonH

MCP Is Dead. The CLI Is Winning the AI Agent Stack

2d
HackerNoonH

Engineers do get promoted for writing simple code

2d
LobstersL

Luxury’s Lost Decade Begins as 50 Million Shoppers Exit the Market

2d
HackerNoonH

NVIDIA’s Nemotron-3 Super 120B FP8 Targets Agentic Workflows at Scale

2d
HackerNoonH

NVIDIA Nemotron-3 Super 120B Targets Agentic AI at Scale

2d
HackerNoonH

4 Tactics for Shipping Faster Without Losing Software Quality

2d
HackerNoonH

How to Break Your PostgreSQL IIoT Database and Learn Something in the Process

2d
HackerNoonH

Why Enterprises Choose PySpark for Real-Time Big Data Analytics

2d
HackerNoonH

Hidden Truth

2d
HackerNoonH

What the Strangler Fig Pattern Teaches Us About Modernizing Legacy Software

3d
HackerNoonH

Gateway Security Won’t Be Enough for MCP-Powered AI

3d
HackerNoonH

Fish Audio’s S2-Pro Brings Emotion Tags to Text-to-Speech

3d
HackerNoonH

Fedora moving from Pagure to Forgejo

3d
LobstersL

This 4B Safety Model Classifies AI Content as Safe, Unsafe, or Controversial

3d
HackerNoonH

Phase 2 Calibration: Fixing Gating and Reward Scoring Together

3d
HackerNoonH

Why CIC Private Debt’s Risk Hire Matters More Than It Looks

3d
HackerNoonH

Node.js — Developing a minimally HashDoS resistant, yet quickly reversible integer hash for V8

3d
LobstersL

Large-scale online deanonymization with LLMs

3d
LobstersL

Lines of code are useful

3d
LobstersL

Vim Racing

3d
LobstersL

Zero-copy protobuf and ConnectRPC for Rust

3d
LobstersL

A Verilog to Factorio compiler and simulator (working RISC-V CPU)

3d
LobstersL

Electric Motorcycles are a Security Nightmare

3d
LobstersL

Read Receipts: An iMessage Simulator

3d
LobstersL

[$] LWN.net Weekly Edition for March 26, 2026

3d
Welcome to LWN.net [LWN.net]W

vim-classic: Long-term maintenance of Vim 8.x

3d
LobstersL

Shell Tricks That Actually Make Life Easier (And Save Your Sanity)

3d
LobstersL

No More Silent Analytics Bugs: All it Takes is One SDK and One Github Action

3d
HackerNoonH

Qwen3.5-9b-uncensored-hauhaucs-Aggressive Model: A Beginner's Guide to Get You Started

3d
HackerNoonH

Updates to GitHub Copilot interaction data usage policy

3d
LobstersL

One File - What if your lockfile and your package list were the same file?

3d
LobstersL

Apple’s macOS UNIX certification is a lie (2025)

3d
LobstersL

Which Design Doc Did a Human Write?

3d
LobstersL

The Cost of Concurrency Coordination

3d
LobstersL
More →

Entries updated Mar 29, 2026 12:26:46 AM PDT

Questions? Suggestions? alex@sumi.news