sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Mar 3
Rails on the BEAM
1h
L
Why Nobody Can Verify What Booted Your Server
2h
L
Understanding the Ultrahonk Verifier
3h
L
The TechBeat: OpenClaw Advanced Tutorial: From Intermediate to Expert in One Guide (4/3/2026)
5h
H
The Design of AI Memory Systems
5h
L
Making a Type Checker/LSP for Nix
5h
L
The Crow-9b-heretic-4.6 Model by Crownelius: What Can You Use It For?
6h
H
Baby’s Second Garbage Collector
7h
L
The HackerNoon Newsletter: 30 BI Engineering Interview Questions That Actually Matter in the AI Era (4/3/2026)
7h
H
Two Tools, 56 APIs: How I Built a Universal MCP Server
7h
H
Signals, the push-pull based algorithm
7h
L
Build your own Dial-up ISP with a Raspberry Pi
7h
L
[$] Ubuntu's GRUBby plans
8h
W
30 BI Engineering Interview Questions That Actually Matter in the AI Era
8h
H
Claude Code Found a Linux Vulnerability Hidden for 23 Years
8h
L
Slap: Functional Concatenative Language... with a Borrow Checker?
8h
L
No kidding: Gentoo GNU/Hurd
9h
W
HackerNoon Projects of the Week: Movement Network Foundation, Packworks & Kyram
9h
H
Big-Endian Testing with QEMU
9h
L
Security updates for Friday
10h
W
apfel: Free AI already on your Mac
10h
L
Lisette — Rust syntax, Go runtime
11h
L
The Data Bottleneck: Architecting High-Throughput Ingestion for Real-Time Analytics
12h
H
What are you doing this weekend?
12h
L
Why Your Retry Logic Is Taking Down Your System (And How to Fix It)
12h
H
Idiomatic Lisp and the nbody benchmark
12h
L
Why Modern Data Platforms Prefer ELT Over ETL
12h
H
Spec-Driven Development - My First Impressions and Opinions
12h
H
The Cost of Compute: Architecting High-Performance SQL in Distributed Lakehouses
12h
H
Monitoring Essential Metrics for Cloud Native Systems - Part 1
12h
H
Free VPNs vs Paid VPNs: What Are You Actually Paying For?
12h
H
Apologia: The Truth Behind the Crime
13h
H
Adobe wrote to my hosts file
13h
L
SSH certificates: the better SSH experience
13h
L
800 Rust terminal projects in 3 years
14h
L
The Specialist’s Dilemma Is Breaking Scientific AI
15h
H
The Missing Data Problem Behind Broken Computer-Use Agents
16h
H
Steering Probability Distributions on Curved Spaces
16h
H
Offensive Cybersecurity Time Horizons
18h
L
1SubMl: experimental ML-like programming language with a unified module and value language, and more
18h
L
Weekend Project: I Built a Full MLOps Pipeline for a Credit Scoring Model (And You Can Too)
18h
H
A CSS Engine in OCaml
21h
L
CDP vs MDM: Similar Goals, Different Jobs
21h
H
Parsing as Response Validation: A New Necessity for Scraping?
21h
H
I Built an AI That Autonomously Penetration Tests a Target, Then Writes Its Own SIEM Defense Rules
21h
H
Building a Cross‑Platform Ollama Dashboard with 95% Shared Code
21h
H
Designing a Resilient Network Control Layer for Financially Critical Pricing Infrastructure
21h
H
Three Years Trying to Make AI Useful for my Actual Job, I Was Solving the Wrong Problem.
22h
H
Break the Loop: How I Finally Understood Functional Programming (Without the Math)
22h
H
I Optimized Everything in My Life — Then My Relationship Fell Apart
22h
H
More →