sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Wed Mar 18

The Structural Risk Behind Ukrainian-Rooted Unicorns

6d
HackerNoonH

What Really Happens When You Stop Posting on X for 2 Months

6d
HackerNoonH

Productive procrastination

6d
LobstersL

Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets

6d
LobstersL

Astounding Stories of Super-Science, April, 2004 - Table of Links

6d
HackerNoonH

No one owes you supply-chain security

6d
LobstersL

Brocards for vulnerability triage

6d
LobstersL

A Drop of Death in a Madman’s Hand

6d
HackerNoonH

Writing design docs

6d
LobstersL

Beneath the Cone

6d
HackerNoonH

A Victorian Bug Story

6d
HackerNoonH

Bringing Rust to the Pixel Baseband

6d
LobstersL

CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)

6d
HackerNoonH

The Trap of "Vibe Coding" and the Rise of Engineering as a Service

6d
HackerNoonH

fakecloud – Free, open-source AWS emulator (LocalStack alternative)

6d
LobstersL

Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script

6d
LobstersL

Investigating Split Locks on x86-64

6d
LobstersL

This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group

6d
HackerNoonH

Why “EVM Hacking” Became a Bigger Story Than EVM Security

6d
HackerNoonH

AI Coding: What Happens When Your Code Outpaces the Systems Around It and What to Do About It

6d
HackerNoonH

High-Level Rust: Getting 80% of the Benefits with 20% of the Pain

1w
LobstersL

A set of Saturday stable kernel updates

1w
Welcome to LWN.net [LWN.net]W

EU's EES fingerprint and photo travel rules come into force

1w
LobstersL

Git fixup is magic (and Magit is too)

1w
LobstersL

Debunking Classical Pseudo-Paradoxes of Logic

1w
HackerNoonH

Using Wireshark to reverse-engineer a USB device

1w
LobstersL

Analyzing KDE Project Health With git

1w
LobstersL

How passive radar works

1w
LobstersL

SQLite 3.53.0

1w
LobstersL

Windows Defender is being used to hack Windows

1w
LobstersL

I Just Want Simple S3

1w
LobstersL

Why Do We Tell Ourselves Scary Stories About AI?

1w
LobstersL

Linux Kernel AI Coding Assistants Policy

1w
LobstersL

Write less code, be more responsible

1w
LobstersL

How Rust is susceptible to supply chain attacks and what we can do to mitigate the inevitable

1w
LobstersL

20 Years on AWS and Never Not My Job

1w
LobstersL

The TechBeat: Build a real-time medical transcription analysis app with AssemblyAI and LLM Gateway (4/11/2026)

1w
HackerNoonH

With AI, you barely need a frontend framework

1w
LobstersL

Advanced Mac Substitute

1w
LobstersL

Agentic AI Could Break the Old Rules of Job Displacement

1w
HackerNoonH

Batman: Arkham Knight - All of the Arkham Episodes Ranked

1w
HackerNoonH

Machine Learning Has a Trust Problem, Not a Talent Problem

1w
HackerNoonH

A bet on whether ML-KEM-768 or X25519 will break first

1w
LobstersL

The Remote Work Fantasy Breaks in Real Life

1w
HackerNoonH

Georgia’s Neutrality Is Becoming a Private Capital Risk

1w
HackerNoonH

How ADHD and AI Work Together Better Than Any Productivity System I Tried

1w
HackerNoonH

Zero-Fee Crypto Swaps Are the Most Expensive Trades You Will Ever Make

1w
HackerNoonH

The AI Illusion (Part 3): Testing the Lies of the Lie Detectors

1w
HackerNoonH

Two Training Paths, One Smarter AI Strategy

1w
HackerNoonH

Educational Byte: What Is a Sybil Attack in Crypto Networks?

1w
HackerNoonH
More →

Entries updated Apr 18, 2026 06:30:15 AM PDT

Questions? Suggestions? alex@sumi.news