sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Tue Jul 8
CSS conditionals with the new if() function
3w
L
Little Pepe (LILPEPE) Surpasses XRP and DOGE as the Crypto Set to Skyrocket 4000% by Q4
3w
H
Fedora SIG changes Python packaging strategy
3w
L
Underused Techniques for Effective Emails
3w
L
Pre-disclosure: Upcoming coordinated security fix for all Matrix server implementations
3w
L
Privacy Is Web3’s “0 To 1” Moment
3w
H
Tech Startup Hacked in Virginia? Understanding Your Urgent Legal Duties
3w
H
Teaching Your AI to Read: A Guide to Scraping, RAG, and Smart Data Insights
3w
H
New AI Model Shows Resilience Amid Sparse Point Cloud Data
3w
H
FGL: a functional graph library (2002)
3w
L
Graph foundation models for relational data
3w
L
How Apex Fusion and Well-Typed Are Shaping the Future of Institutional DeFi on Cardano
3w
H
Kiro and the future of AI spec-driven software development
3w
L
Linear Matching of JavaScript Regular Expressions
3w
L
Too Scared to Ask? How We Solved the #1 Problem with Large University Lectures
3w
H
How 24 Special Queries Optimized a Neural Network’s Recall Rate
3w
H
[$] Fedora SIG changes Python packaging strategy
3w
W
Security updates for Wednesday
3w
W
How Do You Teach I/O Before Monads? Inside a Radical Syllabus for a 1000-Student FP Course
3w
H
GPUHammer: Rowhammer Attacks on GPU Memories are Practical
3w
L
In Sparse Clouds and Ambiguous Texts, This AI Model Still Finds Its Way
3w
H
From Campus to Cloud: Our Journey Teaching Functional Programming to Thousands During a Pandemic
3w
H
Geomys, a blueprint for a sustainable open source maintenance firm (2024)
3w
L
The Web3 Development Writing Contest by GetBlock and HackerNoon: Results Announcement 🎉
3w
H
Expressive test assertions without testify/assert
3w
L
Evaluating T5, RoBERTa, and CLIP in Text-to-Point Cloud Alignment Tasks
3w
H
Code Smell 307 - Naive Time Assumptions and How to Fix It
3w
H
Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5
3w
L
Empirical Analysis of Vulnerable Ethereum Smart Contracts and Their Financial Impact
3w
H
Qualitative and Quantitative Analysis of Relative Position-Enhanced Transformers
3w
H
AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection
3w
H
Reviving Genius
3w
L
Testing Smart Contract Security with AVVERIFIER
3w
H
How a Three-Phase Detector Identifies Smart Contract Vulnerabilities
3w
H
North Korean XORIndex malware hidden in 67 malicious npm packages
3w
L
Where’s Firefox going next? You tell us
3w
L
Janet Feature Demos
3w
L
The TechBeat: No-Code Automation With n8n – Start Here (7/16/2025)
3w
H
To Gunicorn or to Poetry, That is The Question
3w
H
The Lie That Loves You Back
3w
H
Ukraine Is Becoming Hot Spot #1 for Cybersecurity Innovation
3w
H
Meta Abandons Llama in Favor of Claude Sonnet...
3w
H
What Digital Therapy Gets Wrong About Recovery — and Why That Matters More Than Ever
3w
H
The Power of Saying "I Assume the Risk and Its Consequences"
3w
H
We Need Digital Systems That Show Who You’re Becoming
3w
H
How Grammarly and Kasta Made Ukraine a Global Clojure Hotspot
3w
H
AI in Healthcare Content: Can It Truly Meet Google's E-E-A-T Standards?
3w
H
APIs Are Eating the Internet—And Hackers Are Eating APIs
3w
H
What Losing a 125K-Member Reddit Community Taught Me! The Digital Wake-Up Call I Didn’t See Coming
3w
H
Stop Wasting API Calls & Implement the Tab Leader Pattern Instead
3w
H
More →