sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Thu Mar 12
Installing OpenBSD on the Pomera DM250{,XY?}
2d
L
I Wrote an AI Survival Guide for People Afraid of Being Replaced
2d
H
Ritual Protocol Reimagines Secret Storage
2d
H
Human Amnesia Is Blinding Us to AI’s Speed
2d
H
How to Self-Host Vaultwarden on a Home Server
2d
H
How Aging Data Becomes a Crisis
2d
H
The Startups That Win Will Ship Faster and Smarter
2d
H
What Happens When a PM Tries AI Coding
2d
H
Build a Real-Time Market Pulse Dashboard in Streamlit
2d
H
Inside Robolectric: How Android UI Tests Work Without an Emulator
2d
H
The Hidden Trap in Emerging Market Investing
2d
H
SEO Is Not Dead — It’s Being Bypassed
2d
H
Incremental compilation with LLVM
2d
L
What It Takes to Design for 5 Million Crypto Users
2d
H
Enhanced Secures $1M in Strategic Pre-Seed Funding to Bring Structured Yield to More Assets Onchain
2d
H
Here's Why You Should Build Fortresses in Disturbed Markets: The Illusion of Stability
2d
H
My Login Shell in Assembly
2d
L
Yacc is Not Dead (2010)
2d
L
Turn Any Photo Into a Glasses Try-On Experience (No Frameworks Needed)
2d
H
The Feature-Store Paradox: Architecting Real-Time Feature Engineering for AI
2d
H
preact-react-reconciler: turn preact into a react reconciler
2d
L
Test Time Optimization: Semiconductor Manufacturing's Silent Game-Changer
2d
H
Fixing AMDGPU's VRAM management for low-end GPUs
2d
L
Elastic tabstops (2006)
2d
L
Running NixOS Micro VMs on MacOS
2d
L
Entering The Architecture Age
2d
L
The Future of Saving: How AI Is Changing Personal Finance
2d
H
How a Good Narrative Will Win You The Product War
2d
H
Boosting Motivation at Scale in 2026: What Works and What Doesn’t
2d
H
How do we tell truths that might hurt?
2d
L
The HackerNoon Newsletter: The Toxic Status Game Inside Indie Hacking (4/9/2026)
2d
H
Powering the Future of Play: Riyadh Welcomes the Global Games Show
2d
H
Google’s 540B AI Model Is Changing How Machines Think: Here’s Why It Matters
2d
H
Separating Detection Authority From Enforcement Authority in LLM Security
2d
H
How to Master Claude Code & Gemini Code Assist: A Guide on Agent Skills Architecture
2d
H
Why Telecom Billing Is Becoming a Fraud Battleground
2d
H
How I Built a SOC 2-Compliant Cloud-Native Data Lake for Retirement Accounts
2d
H
Inside the VALR-Onafriq Deal That Could Transform Financial Access Across Africa
2d
H
Wastrel milestone: full hoot support, with generational gc as a treat
2d
L
I made a productivity device for less than 50 bucks
2d
L
[$] A flood of useful security reports
2d
W
Relicensing versus license compatibility (FSF Blog)
2d
W
Security updates for Thursday
2d
W
Publishing on HackerNoon Gets You Viral on X. Here's the Data.
2d
H
You can absolutely have an RSS dependent website in 2026
2d
L
Let’s talk about LLMs
2d
L
You Should Stop Fine-Tuning Blindly: What to Do Instead
2d
H
But what about K?
3d
L
TIL that Helix and Typst are a match made in heaven
3d
L
Embedding EYG in Gleam programs
3d
L
More →