sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat May 10
Fri May 9
louise: Polynomial-time Meta-Interpretive Learning for logic programming
1w
L
Naked objects
1w
L
Code Smell 299 - How to Fix Overloaded Test Setups
1w
H
Investigating Ring's Crime Alert System for Police Departments: How We Did It
1w
H
STEPS 2012 Progress and Final NSF Report
1w
L
Introducing Rust 1.86.0: Trait Upcasting, HashMaps, and More
1w
H
DCJ11 Single Board Computer (PDP-11)
1w
L
Exploiting Copilot AI for SharePoint
1w
L
Announcing Lix 2.93 “Bici Bici”
1w
L
I Want to Love Linux. It Doesn’t Love Me Back
1w
L
Reverse engineering the 386 processor's prefetch queue circuitry
1w
L
The HackerNoon Newsletter: Vue.js: Propagating Props Like a Pro (5/10/2025)
1w
H
Are We Serious About Using TLA+ For Statistical Properties?
1w
L
Secure by Design: Google’s Perspective on Memory Safety (2024)
1w
L
How Cell-Based Architecture Helps Big Systems Scale
1w
H
Changelog Slack is dead. Long live Zulip
1w
L
Lume 3 was released
1w
L
TrueNAS CORE is Dead – Long Live zVault
1w
L
Get Your Team to Speak Up: Here's How
1w
H
HACKSAT25: The first multi-tenant satellite unikernel security challenge
1w
L
Introduction to Universal Scene Description (2021)
1w
L
A tool to verify estimates, II: a flexible proof assistant
1w
L
Testing sourcery.ai and GitHub Copilot for cockpit PR reviews
1w
L
A Performance Investigation Challenge
1w
L
bold linker v0.2.0 release - bold just got faster
1w
L
Slow Software for a Burning World
1w
L
In praise of grobi for auto-configuring X11 monitors
1w
L
Tuscolo Static Certificate Transparency Log
1w
L
The TechBeat: Big Monitoring, Small Budget: Powering Observability on Kubernetes with Prometheus, Grafana & Mimir (5/10/2025)
1w
H
Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape
1w
L
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
1w
L
Spatial Data-Management (1979)
1w
L
Algebraic Effects: Another mistake carried through to perfection?
1w
L
A Formal Analysis of Apple’s iMessage PQ3 Protocol
1w
L
The Best Way to Protect Your Packages and Your Ethics
1w
H
Digital Defenders: Meet Syed Shahzaib Shah, Pakistan’s Ethical Hacker Changing the Game
1w
H