sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sun Sep 21
Sat Sep 20
AI Coding Assistants Learn Some Manners with Read-Only Mode
2w
H
Are XSLT stylesheets pure functions?
2w
L
The free software commons (2024)
2w
L
Kernel prepatch 6.17-rc7
2w
W
Kernel Security in the Wild: Side-Channel-Assisted Exploit Techniques, Kernel-Level Defenses, and Real-World Analysis
2w
L
Apple Silicon GPU support in Mojo
2w
L
AI Images in Blog Posts: Can We Do Better?
2w
L
Parsing Crusader Kings III data files to generate mods
2w
L
Storing Unwise Amounts of Data in JavaScript Bigints
2w
L
The Tortoise and the Hare: An Unexpected Scheduling Race Between MILP and CP Solvers
2w
H
Pitting Heuristics Against Exact Solvers in the Flexible Job Shop Gauntlet
2w
H
How to Implement Lazy Loading Images and Videos in JavaScript
2w
H
The Great Bitcoin Abstraction: BlackRock's Plan to Tokenize Your ETF—And Why You Might Own Nothing
2w
H
@ts-ignore is almost always the worst option
2w
L
How to Handle Migrations in Express Using Sequelize
2w
H
A simulator significantly inspired by the first commercial transistor computer, the Metrovick 950
2w
L
The HackerNoon Newsletter: Cypherpunks Write Code: Zooko Wilcox Zcash (9/21/2025)
2w
H
Research Round Up: On Anonymization -Creating Data That Enables Generalization Without Memorization
2w
H
Microstacks or megadependencies over at Webdevcon 2025
2w
L
The Death of Persuasion: Why Future Marketers Must Master Psychological Warfare
2w
H
Cracking the Code: Lessons I Learned About VCs, Pitch Decks, and Building a Product Mindset
2w
H
Spacecoin Saving Lives with Decentralized Connectivity
2w
H
Transitive Dependency Version Resolution in Rust and Java: Comparing the Two
2w
H
DXGI debugging: Microsoft put me on a list
2w
L
I Once Appeared in The Old New Thing
2w
L
Ephemeral Win11 testing VM for a few bucks per month
2w
L
How to Use Sound and AI to Protect the Environment
2w
H
12 Git commands visualized in 3D: a spatial approach to understanding version control
2w
L
Not a Robot
2w
L
Sequoia: Rust OpenPGP implementation
2w
L
Linkgraphs are fun
2w
L
My Hacking Simulator runs on a Cyberdeck
2w
L
Beyond Sandbox Domains: Rendering Untrusted Web Content with SafeContentFrame
2w
L
Less is safer: how Obsidian reduces the risk of supply chain attacks
2w
L
Hacking with AI SASTs: An overview of ‘AI Security Engineers’ / ‘LLM Security Scanners’ for Penetration Testers and Security Teams
2w
L
NixCon 2025 Trip Report
2w
L
he Extinction Equation: What Happens When Advection Goes Too Far?
2w
H
The Simple River Measurement That Predicts Ecosystem Collapse
2w
H
The Mathematics of Life and Death
2w
H
The Math Behind Persistence and Extinction in Freshwater Ecosystems
2w
H
Shai-Hulud, The Most Dangerous NPM Breach In History Affecting CrowdStrike and Hundreds of Popular Packages
2w
L
The Diary of a Datum (2005)
2w
L
The TechBeat: Making LLMs Efficient: Reducing Memory Usage Without Breaking Quality (9/21/2025)
2w
H
Inside the Fake Dev Job Interview Industry
2w
H
The Geek’s Guide to ML Experimentation
2w
H
Can PEAR Make Deep Learning Easier to Trust?
2w
H
Consensus Loss Proves AI Can Be Both Accurate and Transparent
2w
H
The Trade-Off Between Accuracy and Agreement in AI Models
2w
H
Notes on Training Neural Networks for Consensus
2w
H
New AI Study Tackles the Transparency Problem in Black-Box Models
2w
H
More →