sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Thu Apr 18
Wed Apr 17
Events in C#: An Easy-to-Understand Guide
2w
H
Battling Identity Theft in Subscription Based Services: A Personal War Story
2w
H
Ubuntu 24.04 yields a 20% advantage over Windows 11 on Ryzen7 Framework laptop
2w
L
Hydradancer: Faster USB Emulation for Facedancer
2w
L
Here's Why Your "Dream Job" is Bullsh*t
2w
H
XZ/LZMA Worked Example
2w
L
Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance
2w
L
SeedHunter Marketing Module Is live - Web3 Influencer Campaigns With Payment In Stable Coins
2w
H
Adversarial Malware Creation with Model-Based Reinforcement Learning: Appendix
2w
H
From Routine to Rewarding: Integrating ChatGPT Into Product Testing Workflow
2w
H
Why Your AI Startup Should Hire a Head of AI Ethics on Day 1
2w
H
cronometro: Simple benchmarking suite powered by HDR histograms
2w
L
Ruff v0.4.0: a hand-written recursive descent parser for Python
2w
L
Elena Shabanova, Senior Product Designer at PolyAI: Women in Tech Interview
2w
H
Action Breeds Clarity
2w
H
Tech-Driven Tree Planting: How PineOx Moves Beyond Traditional Methods
2w
H
Enhancing Cybersecurity with MEME: Reinforcement Learning for Adversarial Malware Evasion
2w
H
DePIN Tackles the World’s Most Entrenched Industries
2w
H
16 Guides to Get You Started with Apache Iceberg
2w
H
Meta Llama 3
2w
L
We Need to Talk About the State of Calendar Software on Desktop
2w
L
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM
2w
L
Gazelle v0.2
2w
L
PCIe 6.0 overview
2w
L
Why you need a "WTF Notebook"
2w
L
Zest: syntax
2w
L
SQLite on Rails: The how and why of optimal performance
2w
L
MEME vs. PPO: Analyzing Evasion Rates and Binary Modifications in Malware Detection
2w
H
MEME Algorithm's Impact on Adversarial Malware Generation and Model Evasion
2w
H
On Dextaxation
2w
H
Introducing Our New JavaScript Standard Library
2w
H
Transcendence Book 9: Far-skies
2w
H
How Optimistic Rollups Enhance Ethereum's Performance and Security
2w
H
Your Data Strategy is a Cracked Water Bottle in the Desert (and How to Fix It)
2w
H
How Do You Choose the Best Server, CPU, and GPU for Your AI?
2w
H
The History of Novell
2w
L
The Noonification: Elon Musk vs. Mainstream Media (4/18/2024)
2w
H
NumFOCUS concerns
2w
L
Elon Musk vs. Mainstream Media
2w
H
[$] Gentoo bans AI-created contributions
2w
W
The #crypto-api Writing Contest by CoinGecko and HackerNoon
2w
H
[$] Warning about WARN_ON()
2w
W
Security updates for Thursday
2w
W
Solving LeetCode Problems Using Graph Theory
2w
H
seL4 on AArch64 is now verified for functional correctness
2w
L
Natural Language Processing in Bash
2w
L
Memory management in mpmetrics
2w
L
Navigation with Large Language Models: Implementation Details
2w
H
Navigation with Large Language Models: Semantic Guesswork as a Heuristic for Planning: Prompts
2w
H
Navigation with Large Language Models: System Evaluation
2w
H
More →