sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon May 12
Sun May 11
A modern microframework for web development in C
6d
L
Stop Looking At Other Resume Guides: This Is The Only One You'll Ever Need
6d
H
Navigate the PSP Labyrinth: Choosing the Right Payment Partner
6d
H
Modular verification of MongoDB Transactions using TLA+
6d
L
Unstructured Data Is Trying to Tell You Something - Try Listening to It: The Human Side of Logs
6d
H
Multiple Security Issues in Screen
6d
L
Code Smell 300 - Package Hallucination
6d
H
wtfis: passive hostname, domain and IP lookup tool for non-robots
6d
L
Multiple security issues in Screen
6d
W
Understanding LucasArts' iMUSE System
6d
L
China Just Made the World's Fastest Transistor and It Is Not Made of Silicon
6d
L
Buckaroo - a Table UI to expedite data analysis for notebook environments
6d
L
Can You Really Trust That Permission Pop-Up On macOS? (CVE-2025-31250)
6d
L
AB DAO And AB Charity Foundation To Build a Trustworthy Infrastructure For Global Philanthropy
6d
H
Sonic Labs Announces $10M Token Sale To Galaxy For U.S. Expansion
6d
H
Startups, Do You Really Want to Pay The Microservices Tax?
6d
H
From Indie Studios to AAA Deadlines: How SnoopGame Scales Trust
6d
H
Two months in Servo: CSS nesting, Shadow DOM, Clipboard API, and more
6d
L
The last of YaST?
6d
L
Win SEO in the Age of LLMs: Strategies for AI Visibility
6d
H
Spall: a code profiler that runs in your browser
6d
L
How to Select the Right Features for Better Machine Learning Results
6d
H
Can Less Data Make Better Predictions? This Study Says Yes
6d
H
You Can Only Trust Your Data if You Know What to Ignore
6d
H
Test Smarter, Not Harder: How Purpose-Built Test Management Tools Outperform Spreadsheets
6d
H
The HackerNoon Newsletter: Good Programmers Always Be Refactoring (5/12/2025)
6d
H
Android Users Can Now Simulate Phishing Attacks with PyPhisher on Termux—Here's How
6d
H
Understanding Svchost.exe: the Backbone of Windows 11 Processes
6d
H
Guix project migrating to Codeberg
6d
W
Why Bell Labs Worked
6d
L
Meet Sora: HackerNoon Company of the Week
6d
H
[$] The last of YaST?
6d
W
Hyper-Typing
6d
L
Demonstrably Secure Software Supply Chains with Nix
6d
L
Why Vibe When you Can Fly! Machtiani is now Open Source
6d
L
Security updates for Monday
6d
W
Avoid #each_with_object (generally)
6d
L
The Audio Stack Is a Crime Scene
6d
L
The Race for Quantum Superiority Is On
1w
H
Build and Run Your Own FreeBSD-native Containers with Buildah, Containerfiles and Podman
1w
L
Rust project goals 2024: Stabilizing Rust in the Linux Kernel
1w
L
How Enclave Markets is Building a Privacy-First, Fully Encrypted Crypto Exchange
1w
H
Silicon Doesn’t Dream: Why Computers Lack Brains’ Biochemical Magic
1w
H
Are We Building Brain-Inspired or Just Brain-Imitating AI? The Great ANN Debate
1w
H
Mind Over Model: Why AI May Never Capture the Soul of Consciousness
1w
H
Can AI Dream? Rethinking Consciousness Through the Lens of Evolution
1w
H
Advancing Your Software Engineering Career in 2025
1w
H
What are you doing this week?
1w
L
How Tokenizer Choices Shape Hidden Risks in Popular Language Models
1w
H
Where Glitch Tokens Hide: Common Patterns in LLM Tokenizer Vocabularies
1w
H
More →