sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Wed Apr 15
The Twin Diffie-Hellman Problem and Applications (2009)
6d
L
FreeBSD: Local privilege escalation via execve()
6d
L
Replacing a 3 GB SQLite database with a 10 MB FST (finite state transducer) binary
6d
L
Space Cadet Pinball on Linux
6d
L
Good First Issue: Make your first open-source contribution
6d
L
Idempotency Is Easy Until the Second Request Is Different
6d
L
The Intolerable Hypocrisy of Cyberlibertarianism
6d
L
Fast Fourier Transforms Part 1: Cooley-Tukey
6d
L
The Valley Beneath
6d
H
A Block Editor Is Not Just a Text Field
6d
H
GoMining Launches GoBTC Pay to Bring Native Instant Payments to Bitcoin
6d
H
I Thought AI Image Detection Needed a GPU Cluster. It Was Just Metadata
6d
H
AI Made It Easy to Look Like a Builder. Shipping Is Still Hard
6d
H
Cybersecurity in 2026 and Beyond: Trends Everyone Should Know
6d
H
Turn Your Postman Collection Into Pytest Tests With One Command
6d
H
How Writing Helps Developers Think Clearly
6d
H
How AI Is Changing the Role of .NET Developers
6d
H
Figma’s Collapse Should Terrify SaaS Leaders
6d
H
A principled rethinking of array languages like APL
6d
L
AI is Breaking Two Vulnerability Cultures
6d
L
Relational modeling and APL
6d
L
Point-Free Logic Programming
6d
L
Unlocking sudoku's secrets (2025)
6d
L
Flipping the bozo bit on flips the learning off
6d
L
On DOS, floppies, NetBSD and nostalgia
6d
L
87 Blog Posts To Learn About Machine Learning Tutorials
6d
H
Abstract Machines for Logic Programs
6d
L
Aurora: A Leverage-Aware Optimizer for Rectangular Matrices
6d
L
Designing High-Performance Workflow Systems with SLA and Agent Processing
6d
H
Three Cultures of Math
6d
L
The Android Fuzzing Pivot That Cut Costs and Found Better Bugs
6d
H
The Browser Security Breakthrough That Made UAF Exploits Harder
6d
H
Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)
1w
L
500 Blog Posts To Learn About Llms
1w
H
Where Have All the Complex Windows Malware and Their Analyses Gone?
1w
L
Laptops all have built-in security tokens these days
1w
L
ACME CA Comparison
1w
L
Notes on using GNU Emacs' Tramp system in an unusual shell environment
1w
L
Fixing QuickLook (2023)
1w
L
FFmpeg: The Incredible Technology Behind Video on the Internet
1w
L
Yggdrasil Network as an Embedded Go Library
1w
L
Hacking Time: Spoofing Atomic Clocks with Audio Harmonics
1w
L
My Agentic Trust Issues: From Prompt Injection to Supply-Chain Compromise on gemini-cli
1w
L
Zoomex Launches the World’s First Zero-Cost Trading Competition: Let Skill Be Your Only Asset
1w
H
I Will Not Add Query Strings to Your URLs
1w
L
The HackerNoon Newsletter: Nerdy Men Are Having Their Main Character Moment (5/9/2026)
1w
H
WebRTC is the Problem
1w
L
The React2Shell Story and What Happened Next.js
1w
L
The TechBeat: How to Build Production-Ready Agentic AI Systems with TypeScript (5/9/2026)
1w
H
212 Blog Posts To Learn About Llm
1w
H
More →