sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Jul 28
Dotfiles feel too intimate and personal to share
3w
L
[$] Don't fear the TPM
3w
W
Tuba v0.10.0 released
3w
W
New Method Is the Fastest Way To Find the Best Routes
3w
L
zig-error-patterns
3w
L
How to Refine AI-Generated Typefaces with Interface Sliders
3w
H
Reflection-Based Information Leaks Puts Video Conferencing Privacy at Risk
3w
H
Scaling Correctness: Marc Brooker on a Decade of Formal Methods at AWS
3w
L
Dreamcash Begins Rollout Of Trading Platform With Hyperliquid Integration Via Waitlist Access
3w
H
Why hx-boost is actually the most important feature of htmx
3w
L
Typography Just Got Smarter (And a Lot More Expressive)
3w
H
A kbuild and kconfig maintainer change
3w
W
Security updates for Wednesday
3w
W
What Hackers Can Learn by Watching Your Screen Reflections
3w
H
Multi-Modal Typeface Generation Using Vision-Language Models and CLIP
3w
H
How Hash Maps Work
3w
H
More than Two Hard Disks in DOS
3w
L
Create Custom Logos Using TypeDance’s 5-Step Process
3w
H
Why Feeling Behind Means You Are Ahead
3w
H
Zigzag Number Spiral
3w
L
SwapSpace Turns 6: On the Road from Aggregator to Exchange Hub
3w
H
The how and why of GitHub to Codeberg
3w
L
Project Ire autonomously identifies malware at scale
3w
L
Bag of words, have mercy on us
3w
L
What's new in Gleam 1.12? (video walkthrough)
3w
L
c/side CEO and Co-founder Simon Wijckmans on The Importance of Browser-side Security
3w
H
Python performance myths and fairy tales
3w
L
Why are Windows semiannual updates named H1 and H2?
3w
L
Protocol That Leaks Your Every Move: A Guide to DNS Privacy
3w
H
5 Python Libraries I Wish I'd Found Sooner
3w
H
We Didn’t Plan This: How User Feedback Drove Our App Forward
3w
H
Passwords Are Dead. What’s Your Excuse for Still Using Them?
3w
H
5 Major Business Mistakes When Working with Big Data: Lessons from a Company Managing 16 TB of Data
3w
H
How I Audit Startup Funnels in 1 Hour to Find Their Leaks
3w
H
Maximal Extractable Value: How to take advantage—and how to protect from it
3w
H
Stop Exposed Secrets from Breaching Your Code Today: 4 Urgent Steps to Protect Your Organization
3w
H
The Singularity Syndicate: Artifacts
3w
H
The Trap of Expiring Information
3w
H
A Guide to C# Tesseract OCR and a Comparison with IronOCR
3w
H
Function-Level Database Migrations with SQLAlchemy, Alembic, and Pytest
3w
H
I Built a Way to Make Your Music Look as Good as it Sounds
3w
H
Polyfill This! Flat, Map, Filter & Reduce — The Hard Way
3w
H
Rethinking devtools: Escaping the Cloud and SaaS trap
3w
L
How to Manage Security Vulnerabilities Using Budibase—No Code Required
3w
H
Outrank the Algorithm: What LLMs Look for When They ‘Choose’ Your Content
3w
H
Leetcode or Projects — Which One Is Likely to Land You a Tech Job?
3w
H
Why Adding Firestore Slows Down Flutter iOS Builds — And How to Fix It
3w
H
The wall confronting large language models
3w
L
The TechBeat: ChatGPT Agent Mode Explained (8/6/2025)
3w
H
A Proper X86 Assembler in Haskell Using the Escardó-Oliva Functional
3w
L
More →