sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Mar 12

Rust is Just a Tool

3h
LobstersL

What iOS Lockdown mode actually does

4h
LobstersL

DOOM, played over cURL

4h
LobstersL

When AI Becomes the Voice You Think With

4h
HackerNoonH

Architecture for Compliance Scaling Microservices with DDD for High Volume Global Enterprise Systems

4h
HackerNoonH

Meet the Writer: Hacker Noon's Contributor Pavel Manovich, Founder & Product Builder

5h
HackerNoonH

How to Evaluate an AI Persona: Beyond Benchmarks and Vibes

5h
HackerNoonH

Resident Evil Star Milla Jovovich Shipped an AI Memory System. Devs Shredded Its Benchmarks

5h
HackerNoonH

iOS Event Handling Evolution: UIKit Responder Chain and SwiftUI Gestures

5h
HackerNoonH

Alone With the Unknown in Borneo

6h
HackerNoonH

The quest for the perfect 2D sprite pipeline

7h
LobstersL

How to build a git diff driver

7h
LobstersL

IrDA

7h
LobstersL

BASIS Successfully Completes Private Testing as Base58 Labs Prepares for Full-Scale Staking Market

8h
HackerNoonH

The TechBeat: Librarians vs "Data Cartels": What's Going On? (4/12/2026)

8h
HackerNoonH

When a Flower Becomes a Predator

8h
HackerNoonH

The End of Eleventy

8h
LobstersL

Why I'm Building a Database Engine in C#

8h
LobstersL

How Gran Turismo's Creator Snuck a Sim Into a Mario Kart Rival to Persuade Sony Execs

12h
LobstersL

Designing Fintech Across Fifteen Countries

13h
HackerNoonH

Serbia Builds While the West Borrows

14h
HackerNoonH

Surely there must be a way to make container secrets less dangerous?

14h
LobstersL

The Structural Risk Behind Ukrainian-Rooted Unicorns

14h
HackerNoonH

What Really Happens When You Stop Posting on X for 2 Months

15h
HackerNoonH

Productive procrastination

15h
LobstersL

Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets

16h
LobstersL

Astounding Stories of Super-Science, April, 2004 - Table of Links

17h
HackerNoonH

No one owes you supply-chain security

17h
LobstersL

Brocards for vulnerability triage

18h
LobstersL

A Drop of Death in a Madman’s Hand

19h
HackerNoonH

Writing design docs

19h
LobstersL

Beneath the Cone

19h
HackerNoonH

A Victorian Bug Story

19h
HackerNoonH

Bringing Rust to the Pixel Baseband

19h
LobstersL

CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)

21h
HackerNoonH

The Trap of "Vibe Coding" and the Rise of Engineering as a Service

21h
HackerNoonH

fakecloud – Free, open-source AWS emulator (LocalStack alternative)

22h
LobstersL

Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script

23h
LobstersL

Investigating Split Locks on x86-64

23h
LobstersL

This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group

23h
HackerNoonH

Why “EVM Hacking” Became a Bigger Story Than EVM Security

23h
HackerNoonH

AI Coding: What Happens When Your Code Outpaces the Systems Around It and What to Do About It

23h
HackerNoonH

High-Level Rust: Getting 80% of the Benefits with 20% of the Pain

1d
LobstersL

A set of Saturday stable kernel updates

1d
Welcome to LWN.net [LWN.net]W

EU's EES fingerprint and photo travel rules come into force

1d
LobstersL

Git fixup is magic (and Magit is too)

1d
LobstersL

Debunking Classical Pseudo-Paradoxes of Logic

1d
HackerNoonH

Using Wireshark to reverse-engineer a USB device

1d
LobstersL

Analyzing KDE Project Health With git

1d
LobstersL

How passive radar works

1d
LobstersL
More →

Entries updated Apr 12, 2026 06:01:48 AM PDT

Questions? Suggestions? alex@sumi.news