sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Fri Jun 6
Local LLM Tool Calling: Which LLM Should You Use?
5d
L
Exception handling in rustc_codegen_cranelift
5d
L
What If Your Blog Had a Product Manager? (Hint: It’s You)
5d
H
CLAIM: A Contextual Language Model for Accurate Imputation of Missing Tabular Data
5d
H
Faster, More Accurate IoT Security: A Quantitative Analysis of the CUMAD Framework
6d
H
Redefining IoT Threat Detection: The Power of Cumulative Analysis in the CUMAD Framework
6d
H
Solving the IoT's "Boy Who Cried Wolf" Problem: From Individual Alerts to Cumulative Certainty
6d
H
FUZZING'25 Keynote: "Are you sure you belong in academia?"
6d
L
Helix language
6d
L
Cloud native LSM Key-Value Store with searchable compression algo and distributed compaction
6d
L
How to Build a Modular Selenium + Cucumber Framework in Java
6d
H
GNU Health Hospital Information System 5.0 released
6d
W
How CUMAD Accumulates Evidence to Unmask Compromised IoT Devices
6d
H
input-branches: Workflow and flake-part for flake input patching using imported git branches
6d
L
[$] Yet another way to configure transparent huge pages
6d
W
Building the Unbreakable Contract: A Pipeline for AI-Powered Vulnerability Classification and Repair
6d
H
Introducing pay per crawl: enabling content owners to charge AI crawlers for access
6d
L
Will VR Integration for Remote Work Become Permanent?
6d
H
A Novel Pipeline for Classifying and Repairing Smart Contracts at Scale
6d
H
Why You Can't Miss SpoonOS's Developer Call S1 for AI Innovation
6d
H
Why Your Next Smart-Home Device Hunts Mosquitoes: Meet Bzigo Iris
6d
H
Little Pepe (LILPEPE) Breezes Past 3rd Presale Stage in Record Time
6d
H
Stablecoins, Smart Contracts and The Rise of More Intelligent Cash
6d
H
[$] Improved load balancing with machine learning
6d
W
15 Years of OsmAnd
6d
W
From Python Programmer to Distributed Systems Researcher in 10 Years Without a PhD
6d
L
Security updates for Tuesday
6d
W
Why Extracting Text From PDFs Still Feels Like a Hack–And the Legacy Design that Keeps AI Stuck
6d
H
How Blockchain Is Redefining Financial Inclusion for the Unbanked in 2025
6d
H
From Crisis to Security - How DePIN Can Solve Tonga's Cybersecurity Challenges
6d
H
Finding and understanding bugs in C compilers (2011)
6d
L
Alternative Blanket Implementations for a Single Rust Trait
6d
L
How U.S. Copyright Law Applies to LLM Training
6d
H
QDyLoRA in Action: Method, Benchmarks, and Why It Outperforms QLoRA
6d
H
Beyond Static Ranks: The Power of Dynamic Quantization in LLM Fine-Tuning
6d
H
More Than a Feeling: Visualizing Why Filter Atoms Outsmart LoRA in Fine-Tuning
6d
H
Tuning the Pixels, Not the Soul: How Filter Atoms Remake ConvNets
6d
H
Keep the Channel, Change the Filter: A Smarter Way to Fine-Tune AI Models
6d
H
Anthropic Admits to Copying Books en masse for Claude—Can Fair Use Save It?
6d
H
Meet the HackerNoon Top Writers - Vladislav Guzey on Writing and Creativity
6d
H
Hyra Network Honored As "Technology Startup Of The Year" At The 2025 Globee® Awards
6d
H
Shheikh.io Launches SHHEIKH Token Presale For Blockchain-Backed Real‑World Asset Investments
6d
H
Reflections on Haskell and Rust
6d
L
Anthropic Copyright Lawsuit Tests Fair Use Limits in AI Model Training
6d
H
Anthropic Sued for Allegedly Pirating Millions of Books to Train Claude AI
6d
H
What is isomorphism?
6d
L
`git stage` over `git add`
6d
L
The TechBeat: AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402 (7/1/2025)
6d
H
Mathematical Proofs for Truthful Rebate Mechanisms (TFRM)
6d
H
More →