sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Tue Mar 24

When compilers surprise you

5d
LobstersL

The electromechanical angle computer inside the B-52 bomber's star tracker

5d
LobstersL

Anthropic Claude Code Leak Reveals Critical Command Injection Vulnerabilities

5d
LobstersL

PgQue: Zero-bloat Postgres queue

5d
LobstersL

Some secret management belongs in your HTTP proxy

5d
LobstersL

Memory Leaks in Swift: The Silent Killer of iOS Apps

5d
HackerNoonH

BTCC Exchange Launches SpaceX Pre-IPO Perpetual Futures Trading and Celebrates With Tesla Cyberbeast

5d
HackerNoonH

Bitcoin Mining vs Bitcoin Recovery: Two Different Systems, Two Different Timelines

5d
HackerNoonH

Stop Greenlighting Projects You Haven’t Validated

5d
HackerNoonH

Hello old new “Projects” directory

5d
LobstersL

Optimizing Ruby Path Methods

5d
LobstersL

The Trap of Elegant Architecture

5d
HackerNoonH

Anthropic's Claude Mythos Launch Is Built on Misinformation

5d
LobstersL

The HackerNoon Newsletter: The Proof of Usefulness Algorithm: Is It Good? Do People Use It? (4/18/2026)

5d
HackerNoonH

What Ghost Murmur Technology Actually Is (It's Not a Heartbeat Detector)

5d
HackerNoonH

Seven stable kernels for Saturday

6d
Welcome to LWN.net [LWN.net]W

The Secret Life of Circuits

6d
LobstersL

MAD Bugs: Even "cat readme.txt" is not safe

6d
LobstersL

SQLite prefixes its temp files with `etilqs_`

6d
LobstersL

Native IPv6 Kubernetes for true edge routing

6d
LobstersL

State of Kdenlive - 2026

6d
LobstersL

Running a Minecraft Server and more on a 1960s UNIVAC Computer

6d
LobstersL

How (and why) we rewrote our production C++ frontend infrastructure in Rust

6d
LobstersL

Unicode Variation Selectors (2007)

6d
LobstersL

Towards Trust in Emacs

6d
LobstersL

“Discovery Tax” Highlights Cost of Incomplete Requirements in Tech Projects

6d
HackerNoonH

How GitHub uses eBPF to improve deployment safety

6d
LobstersL

The Complete C Programming Roadmap for Beginners (2026) — From Zero to Confident Programmer

6d
LobstersL

The TechBeat: Qwen3.5-9b-uncensored-hauhaucs-Aggressive Model: A Beginner's Guide to Get You Started (4/18/2026)

6d
HackerNoonH

The Proof of Usefulness Algorithm: Is It Good? Do People Use It?

6d
HackerNoonH

MOSS-TTS-Nano-100M Brings Multilingual Voice Cloning to CPUs

6d
HackerNoonH

Neural Nets Rebuild Temporal CT

6d
HackerNoonH

WildDet3D Wants to Break 3D Detection Out of the Benchmark Box

6d
HackerNoonH

A beginner's guide to the Supergemma4-26b-uncensored-gguf-v2 model by Jiunsong on Huggingface

6d
HackerNoonH

Lenses in Rust and My Solution

6d
LobstersL

We Built a Local Model Arena in 30 Minutes — Infrastructure Mattered More Than the App

6d
HackerNoonH

5 Characters That Need to be in Marvel's Spider-Man 3

6d
HackerNoonH

Deleteduser.com —a $15 PII Magnet

6d
LobstersL

Baidu’s ERNIE-Image Turns Short Prompts Into Detailed Visuals

6d
HackerNoonH

It Is Time to Ban the Sale of Precise Geolocation Data

6d
LobstersL

Terminator: The Story of the 6502 Code You See Onscreen

6d
LobstersL

Building ezli.me, a link shortener in Rust

6d
LobstersL

How World ID's Biggest Upgrade Replaces Device Trust With Human Continuity

6d
HackerNoonH

Why is IPv6 so complicated?

6d
LobstersL

How Fhenix and Ethereum Are Racing a Quantum Clock Nobody Can See

6d
HackerNoonH

A simplified model of Fil-C

6d
LobstersL

AppArmor's experimental permissions prompting (2024)

6d
LobstersL

How Pharos Network Is Betting USDC Can Crack the $26 Billion RWA Market

6d
HackerNoonH

LLM Evals Are Not Enough: The Missing CI Layer Nobody Talks About

6d
HackerNoonH

Product-Market Fit Is a Perishable Good — Here’s the Operating Manual

6d
HackerNoonH
More →

Entries updated Apr 24, 2026 08:32:46 AM PDT

Questions? Suggestions? alex@sumi.news