sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Dec 25

Implementation of the Apollo Guidance Computer in an FPGA

2d
LobstersL

Dynamic GHC matrix in GitHub CI

2d
LobstersL

Learning Low-Level Computing and C++ by Making a Game Boy Emulator - The Making of GameByte

2d
LobstersL

Compiling Scheme to WebAssembly

2d
LobstersL

Exploit Cursor Agents to create persistent, distributed threats

2d
LobstersL

Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"

2d
LobstersL

We built a museum exhibit about a 1990s game hint line, with a physical binder

2d
LobstersL

Instagram Creators Should Check If Their Posts Are Being Deemed Political

2d
HackerNoonH

How to Make Your Legacy Exception-Throwing Code Compatible With Lambdas

2d
HackerNoonH

AlphaTON Launches Claude Connector Powered By TON And Telegram

2d
HackerNoonH

How to Add the AWS WAF CAPTCHA to an Angular Application

2d
HackerNoonH

remotely unlocking an encrypted hard disk with systemd initrd on Arch

2d
LobstersL

Educational Byte: What Are Fed Rates and Why Do They Affect Crypto Prices?

2d
HackerNoonH

vnccc: vnc wrapped claude code

2d
LobstersL

SSH has no Host header

2d
LobstersL

CTA Hierarchy in the Wild

2d
LobstersL

I was banned from Claude for scaffolding a CLAUDE.md file

2d
LobstersL

The Code-Only Agent

2d
LobstersL

A Protocol for Package Management

2d
LobstersL

JS Returns Undefined

2d
LobstersL

[$] Linux Kernel Runtime Guard reaches its 1.0 release

2d
Welcome to LWN.net [LWN.net]W

You CAN Average Percentiles (2016)

2d
LobstersL

The HackerNoon Newsletter: 5 Risks You Have To Take as a Leader (1/22/2026)

2d
HackerNoonH

Why Expected Value Is Not Enough in Production Trading Systems

2d
HackerNoonH

How to Advertise Your Startup the Right Way

2d
HackerNoonH

Ghost in the Wi-Fi

2d
LobstersL

Architecture for Disposable Systems

2d
LobstersL

Why “It Works” Is Often the Most Dangerous Phrase in Product Design

2d
HackerNoonH

The Problem With Perfect AI Is That Mathematics Won’t Allow It

2d
HackerNoonH

Optimization Log: How I Pushed a 2,750-Word Guide to 97/100 PageSpeed for AI Search

2d
HackerNoonH

30 years of ReactOS

2d
Welcome to LWN.net [LWN.net]W

Rust 1.93.0 released

2d
Welcome to LWN.net [LWN.net]W

Security updates for Thursday

2d
Welcome to LWN.net [LWN.net]W

Announcing Rust 1.93.0

2d
LobstersL

How Static and Hybrid Analysis Can Cut Privacy Review Effort by 95%

2d
HackerNoonH

Vibe Kanban - Orchestrate AI Coding Agents

2d
LobstersL

What 100 GitHub Projects Reveal About Personal Data in Modern Software

2d
HackerNoonH

CSLib: A Focused Effort on Formalizing Computer Science in Lean

2d
LobstersL

Agentic AI Is Forcing Organizations to Rethink How Work Is Designed

2d
HackerNoonH

RPi3 running FreeBSD 12 clocks 390 days uptime as a Radius server

2d
LobstersL

GoodJob, Solid Queue, Sidekiq, Active Job, in 2026

2d
LobstersL

Data-Driven Ranking Reveals Where Privacy Risks Actually Live in Java and JavaScript Code

2d
HackerNoonH

An adversarial coding test

2d
LobstersL

Your App Subscription Is Now My Weekend Project

2d
LobstersL

Subagents, Commands and Skills Are Converging

2d
LobstersL

From Written Off to Tech Lead: How Gowtham Reddy Kunduru Built Engineering Leadership

2d
HackerNoonH

Waiting for dawn in search: Search index, Google rulings and impact on Kagi

2d
LobstersL

The TechBeat: CodeRabbit vs Code Reviews in Kilo: Which One Is Best For You in 2026 (1/22/2026)

2d
HackerNoonH

New Research Shows 64% of Third-Party Applications Access Sensitive Data Without Authorization

2d
HackerNoonH

Secure Boot, TPM and Anti-Cheat Engines

2d
LobstersL
More →

Entries updated Jan 24, 2026 06:42:22 PM PST

Questions? Suggestions? alex@sumi.news