sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Mar 10
Pipevals: Evaluation pipelines for every LLM application
1w
L
Historical GitHub Uptime Charts
1w
L
A Model Overview of Locotrainer-4b Model by Locoremind: The Ins and Outs
1w
H
[RFC] clang-reforge: Automatic whole-codebase source code rewriting tool for security hardening
1w
L
Runtime type checking is great (2023)
1w
L
The HackerNoon Newsletter: How to Improve Your Debounce and Get It to Stop Lying to You (3/31/2026)
1w
H
Software You Can Love 2026 tickets are on sale
1w
L
[$] The role of LLMs in patch review
1w
W
The Subprime Technical Debt Crisis
1w
L
Objections to systemd age-attestation changes go overboard
1w
L
RubyGems Fracture Incident Report
1w
L
How to Improve Your Debounce and Get It to Stop Lying to You
1w
H
[$] Objections to systemd age-attestation changes go overboard
1w
W
Vulnerability Research Is Cooked (sockpuppet.org)
1w
W
Security updates for Tuesday
1w
W
February in Servo: faster layout, pause and resume scripts, and more
1w
L
Data Indexing in Golang
1w
L
Unmasking the Truth
1w
H
Autoscaling CI for Gitea in Rust
1w
L
The High Cost of Hesitation: Why the Senate Must Provide CLARITY
1w
H
ZepoteQ Earns an 87.4 Proof of Usefulness Score by Building Scalable SaaS Platforms and Business Automation Tools
1w
H
Video Wizard Earns a 43 Proof of Usefulness Score by Building an AI-Powered Video Content Analysis Platform
1w
H
Nostr WoT Earns a 57 Proof of Usefulness Score by Building a Portable Web of Trust Layer for the Browser
1w
H
Typhoon Earns a 46 Proof of Usefulness Score by Building Robust Retry Policies for Asynchronous Swift Operations
1w
H
Trivially breaking confidential VMs
1w
L
The Man Who Thinks AI Can Beat the Market
1w
H
Quiet Cost Earns a 34 Proof of Usefulness Score by Building an Executive Diagnostic Tool for Hidden Revenue Leakage
1w
H
Exposé
1w
H
JSSE: A JavaScript Engine Built by an Agent
1w
L
From SQL Analytics to Predictive Decision Systems: Operationalizing ML Models in Business Operation
1w
H
Why Your Kubernetes Platform Team Is Still Answering Tickets in 2026
1w
H
How Financial Institutions Can Build a Strong Sanctions Compliance Framework
1w
H
Why Your Engineering Team Is Slow (It's the Codebase, Not the People)
1w
L
Supply Chain Attack on Axios
1w
L
Let the commits tell the story
1w
L
Tree of functions, called during boot of Linux kernel v7.0-rc1
1w
L
AI for Enterprise: A Practitioner's Guide
1w
H
Why Gaming, AI, and Better UX Will Define the Next Wave
1w
H
Flying Into the Light - What Europe's Energy Transition Taught Me About Tonga's Future
1w
H
ClickFix Attacks Are Targeting VC and Fintech Talent with New Multi-Stage Loader Techniques
1w
H
New Reproducibility Standard Exposes Hidden Variables in Database-Kernel Performance Research
1w
H
The TechBeat: The 8 Best Medical Alert Systems for 2026 (3/31/2026)
1w
H
cocoa-way: Native macOS Wayland Compositor written in Rust using Smithay
1w
L
Why have supply chain attacks become a near daily occurrence ?
1w
L
Claude finds RCE in Vim and Emacs
1w
L
The Crow-9b-heretic Model by Crownelius: Here's What You Need to Know
1w
H
What Is LMEB? Long-Horizon Memory Embedding Benchmark Explained
1w
H
ONLYOFFICE flags license violations in “Euro-Office” project
1w
L
Quantum Computers Exist. Making Them Useful Is the Hard Part
1w
H
AI Doesn’t Lie - It Reflects How Fragmented Signals Distort What LLMs Think Your Company Is
1w
H
More →