sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Apr 16

Reversing SynthID

3w
LobstersL

Modern rendering culling techniques

3w
LobstersL

Borrow-checking without type-checking

3w
LobstersL

Inside Lazarus: How North Korea uses AI to industrialize attacks on developers

3w
LobstersL

[$] LWN.net Weekly Edition for April 23, 2026

3w
Welcome to LWN.net [LWN.net]W

Explain the Cursor Elon Musk Deal to Me Like I'm 5: A Technical Report on the $60B Option to Acquire

3w
HackerNoonH

Coinlocally Lists Tesla, Amazon, Apple, More Tokenized Stock Pairs, Launches Zero-Fee Trading

3w
HackerNoonH

nondescript: a simple embedded programming language

3w
LobstersL

Olive CSS: Lisp powered vanilla CSS utility-class a la Tailwind

3w
LobstersL

222 Blog Posts To Learn About Ai Agents

3w
HackerNoonH

It’s trivial to create your own hacking robot

3w
LobstersL

Why Most Financial Chatbots Are Broken by Design — And What It Actually Takes to Fix Them

3w
HackerNoonH

We Found a Stable Firefox Identifier Linking All Your Private Tor Identities

3w
LobstersL

AI Just Solved the Wrong Half of Cybersecurity

3w
HackerNoonH

Arch Linux now has a bit-for-bit reproducible Docker image

3w
LobstersL

Your Next Hire Doesn't Sleep: An Engineer's Honest Take on Agentic AI in 2026

3w
HackerNoonH

Telemetry-Driven Development

3w
LobstersL

OpenAI Open-Sources Privacy Filter, a Tiny Model That Scrubs PII Without an API Call

3w
HackerNoonH

What are your favorite Emacs packages?

3w
LobstersL

Forge

3w
LobstersL

Cryptographic Right Answers: Post Quantum and Rust Edition

3w
LobstersL

Linux application sandboxing - old tech for the future

3w
LobstersL

What Happens When AI Can Write Code But Not Explain It?

3w
HackerNoonH

The secret history of Recursion Schemes

3w
LobstersL

LemmaScript: A Verification Toolchain for TypeScript via Dafny

3w
LobstersL

An Algorithmic Reconstruction of Normalisation by Evaluation

3w
LobstersL

Twitter vs X: One Built Culture, the Other Wants to Build a System

3w
HackerNoonH

It's All Just Trees With Web Origami

3w
LobstersL

The HackerNoon Newsletter: A Look Inside the HackerNoon Audience (4/22/2026)

3w
HackerNoonH

[$] Dependency-cooldown discussions warm up

3w
Welcome to LWN.net [LWN.net]W

Lessons Learned Hacking Infra For 30 Years With Jon Brookes

3w
HackerNoonH

A Look Inside the HackerNoon Audience

3w
HackerNoonH

Using LLMs to find Python C-extension bugs

3w
LobstersL

Satoshi’s Identity May Not Matter Anymore, but His Bitcoin Still Does

3w
HackerNoonH

The Edge of Safe Rust

3w
LobstersL

221 Blog Posts To Learn About AI Agents

3w
HackerNoonH

How to Teach the LLM to Think With Your Data

3w
HackerNoonH

[$] One Sized trait does not fit all

3w
Welcome to LWN.net [LWN.net]W

Some general notes on network booting UEFI machines

3w
LobstersL

LilyPond 2.26.0 released

3w
Welcome to LWN.net [LWN.net]W

Impeccable: Design skills for AI harnesses

3w
LobstersL

Four stable kernels for Wednesday

3w
Welcome to LWN.net [LWN.net]W

Security updates for Wednesday

3w
Welcome to LWN.net [LWN.net]W

Markdown (2004)

3w
LobstersL

GitHub Actions for a Gleam monorepo

3w
LobstersL

What Async Promised and What it Delivered

3w
LobstersL

From Hypertext to Algorithmic Culture

3w
HackerNoonH

AI as a Fascist Artifact

3w
LobstersL

How We Built an AI Agent for Self-Service Analytics

3w
HackerNoonH

BreachLock Named Representative Vendor in Gartner Market Guide for Adversarial Exposure Validation

3w
HackerNoonH
More →

Entries updated May 17, 2026 10:56:24 AM PDT

Questions? Suggestions? alex@sumi.news