sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Wed Mar 18
The HackerNoon Newsletter: Why Your “Profitable” Backtest Fails the Moment You Go Live (4/12/2026)
5d
H
China Gave Its AI Away
5d
H
How I run multiple $10K MRR companies on a $20/month tech stack
5d
L
How to Set Up an ESP32 with VS Code on Windows
5d
H
What is a property?
5d
L
Field of Dreams Was Wrong. And It’s Cost Founders Billions
5d
H
How to Optimize Market Data APIs for Millisecond-Level Trading Performance
5d
H
How Crypto.com Landed the First Ever UFC Fight Night on the White House Lawn
5d
H
Fixing Indefinite Geolocation Hangs in React and React Native Applications
5d
H
Using JIT Compilation to Improve Performance and Reduce Cloud Spend
5d
H
Configuring Subledger Accounting (SLA) Rules in Oracle Fusion Cloud Financials
5d
H
Scaling Dependency Graphs for Real-Time Computation in Finance and Beyond
5d
H
Designing a Real-Time AI Voice Agent With RAG, SIP Integration, and Compliance Guardrails
5d
H
Rust is Just a Tool
5d
L
Rust + OpenGL: Rendering 250,000 Dynamic 3D Entities at 50 FPS on a Single CPU Thread
6d
H
The Island That Hatched Extinction
6d
H
What iOS Lockdown mode actually does
6d
L
DOOM, played over cURL
6d
L
When AI Becomes the Voice You Think With
6d
H
Architecture for Compliance Scaling Microservices with DDD for High Volume Global Enterprise Systems
6d
H
Meet the Writer: Hacker Noon's Contributor Pavel Manovich, Founder & Product Builder
6d
H
How to Evaluate an AI Persona: Beyond Benchmarks and Vibes
6d
H
Resident Evil Star Milla Jovovich Shipped an AI Memory System. Devs Shredded Its Benchmarks
6d
H
iOS Event Handling Evolution: UIKit Responder Chain and SwiftUI Gestures
6d
H
Alone With the Unknown in Borneo
6d
H
The quest for the perfect 2D sprite pipeline
6d
L
How to build a git diff driver
6d
L
IrDA
6d
L
BASIS Successfully Completes Private Testing as Base58 Labs Prepares for Full-Scale Staking Market
6d
H
The TechBeat: Librarians vs "Data Cartels": What's Going On? (4/12/2026)
6d
H
When a Flower Becomes a Predator
6d
H
The End of Eleventy
6d
L
Why I'm Building a Database Engine in C#
6d
L
How Gran Turismo's Creator Snuck a Sim Into a Mario Kart Rival to Persuade Sony Execs
6d
L
Designing Fintech Across Fifteen Countries
6d
H
Serbia Builds While the West Borrows
6d
H
Surely there must be a way to make container secrets less dangerous?
6d
L
The Structural Risk Behind Ukrainian-Rooted Unicorns
6d
H
What Really Happens When You Stop Posting on X for 2 Months
6d
H
Productive procrastination
6d
L
Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets
6d
L
Astounding Stories of Super-Science, April, 2004 - Table of Links
6d
H
No one owes you supply-chain security
6d
L
Brocards for vulnerability triage
6d
L
A Drop of Death in a Madman’s Hand
6d
H
Writing design docs
6d
L
Beneath the Cone
6d
H
A Victorian Bug Story
6d
H
Bringing Rust to the Pixel Baseband
6d
L
CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)
6d
H
More →