sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Nov 2
Luarrow - True pipeline operators and elegant Haskell-style function composition for Lua
39m
L
Running Linux on a RiscPC, why is it so hard?
1h
L
Roko's dancing basilisk
1h
L
How should we peer review software?
2h
L
Nice to Meet You: Synthesizing Practical MLIR Abstract Transformers
4h
L
NewsUnfold Tests a Crowdsourced Approach to Detecting Media Bias
6h
H
Color-Coded Bias Warnings Boost Accuracy and Efficiency in AI Feedback
6h
H
Human-in-the-Loop Models Could Improve Media Bias Detection, Study Finds
6h
H
Can User Feedback Fix Slanted News? Researchers Think So
6h
H
A Traveler's Guide to Method Dispatch in Swift
6h
H
Composing capability security and conflict-free replicated data types
7h
L
Meet Klink Finance: HackerNoon Company of the Week
8h
H
In defense of lock poisoning in Rust
8h
L
Srilatha Samala’s Agile Intelligence Approach to Enterprise Reporting as a Strategic Asset
9h
H
Can we build WeChat Mini Apps using open web standards?
9h
L
Cyber Startup Frenetik Launches With Patented Deception Technology Betting Against The AI Arms Race
9h
H
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
9h
H
Quantifying Information Loss
9h
L
BC.GAME named Exclusive Gaming Partner of Crypto Fight Night 2025
9h
H
Web-based markdown editor with no AI
9h
L
100000 TPS over a billion rows: the unreasonable effectiveness of SQLite
9h
L
Noise, Stability, and ML model Calibration
9h
L
ACME Challenge for Persistent DNS TXT Record Validation
9h
L
Progress on TypeScript 7 - December 2025
10h
L
EmacsConf 2025
10h
L
Iron Vision HUD: My Take on Tony Stark’s Iconic Helmet Interface
11h
H
Cardano’s 14-Hour Stress Test: How the Network Took a Hit and Healed Itself
11h
H
Solid state volumetric display
11h
L
zmx: session persistence for terminal processes
11h
L
When the Models Forget You: The Hidden Brand Failure No One Is Monitoring Yet
11h
H
AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier
11h
H
The HackerNoon Newsletter: How Will We Distinguish Truth From Fiction? (12/2/2025)
12h
H
Prompt-Powered Personas: How AI Finally Fixes the Messy World of User Profiling
12h
H
Solar Reality - A Radical Reassessment of Life, Intelligence, and Causality
12h
H
Let's Encrypt to reduce certificate lifetimes
12h
W
Inside ODT Trade Desk's Mission to Bring Private Banking Standards to Cryptocurrency
13h
H
nixtml: Static website and blog generator written in nix
13h
L
Preventing PR Nightmares: How to Build Communications Strategy Early
13h
H
My First Impressions of MeshCore Off-Grid Messaging
14h
L
FreeBSD 15.0 released
14h
W
Solving AoC in Q
14h
L
[$] Zig's new plan for asynchronous programs
14h
W
Security updates for Tuesday
14h
W
How Falcon Finance's $2B Platform Just Added Its First Non-Dollar Sovereign Asset
14h
H
How Myriad and Trust Wallet Built the First Native Prediction Market for 220M Users
14h
H
Lazier Binary Decision Diagrams (BDDs) for set-theoretic types
14h
L
When software becomes fast food
14h
L
Go proposal: Type-safe error checking
15h
L
Case Study: How a Payment Link Doubled Orders for an E-Commerce Product in an Emerging Market
16h
H
How to Build a Public Case Creation Portal on Salesforce Experience Cloud
16h
H
More →