sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Dec 29
[$] Filesystem medley: EROFS, NTFS, and XFS
5d
W
The Moral Character of Cryptographic Work (2015)
5d
L
AI: Good Instructor, Terrible Educator
5d
L
Scaling PostgreSQL to power 800 million ChatGPT users
5d
L
GNU Guix 1.5.0 released
5d
W
Two new stable kernels for Friday
5d
W
Firefox & Linux in 2025
5d
L
Security updates for Friday
5d
W
Interfaces and traits in C
5d
L
Improving the usability of C libraries in Swift
5d
L
What has Docker become?
5d
L
AGENTS.md as a dark signal
5d
L
Why 2026 is the Year Healthcare Finally Hires AI Agents
6d
H
Post-Agentic Code Forges
6d
L
How I Turned Instagram Growth Into Brand Deals Using Path Social
6d
H
Replacing Protobuf with Rust to go 5 times faster
6d
L
Explainer: Tree-sitter vs. LSP
6d
L
What I've learned building an agent for Renovate config (as a cautious skeptic of AI)
6d
H
GPTZero finds 100 new hallucinations in NeurIPS 2025 accepted papers
6d
L
llama-conductor is a router + memory store + RAG harness to force models to behave like predictable components
6d
L
The WebRacket language is a subset of Racket that compiles to WebAssembly
6d
L
Maintaining shadow branches for GitHub PRs
6d
L
The TechBeat: SeaTunnel CDC Explained: A Layman’s Guide (1/23/2026)
6d
H
Selectively Disabling HTTP/1.0 and HTTP/1.1
6d
L
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence
6d
H
When "Good Enough" UX Becomes the Most Expensive Decision You'll Ever Make
6d
H
SemanticGen Proves Video AI Doesn’t Need More Power—Just Better Abstractions
6d
H
The Game AI Problem Computers Were Never Built to Solve
6d
H
Exploring Quantum Machine Learning for Time Series Stock Prediction
6d
H
I Added CISA KEV to Vulnerability Prioritization and Coverage Jumped +413%
6d
H
Contract-First APIs: How OpenAPI Becomes Your Single Source of Truth
6d
H
Small Wins, Big Impact: Revenue & Churn Automation Secrets
6d
H
Low Code and No Code in 2026: The Way I Pick a Platform Without Regret
6d
H
The Remote Developer's Survival Guide: 10 Technical Strategies to Prevent Burnout
6d
H
How to Enter the Proof of Usefulness (PoU) Hackathon
6d
H
The Midnight Lesson Planner: How to Reclaim Your Evenings and Ignite Your Classroom
6d
H
Why I started a Bitcoin Education Website
6d
H
Geometric Deep Learning: Neural Networks in Spherical, Hyperbolic, and Non-Euclidean Spaces
6d
H
Why does SSH send 100 packets per keystroke?
6d
L
Implementation of the Apollo Guidance Computer in an FPGA
6d
L
Dynamic GHC matrix in GitHub CI
6d
L
Learning Low-Level Computing and C++ by Making a Game Boy Emulator - The Making of GameByte
6d
L
Compiling Scheme to WebAssembly
6d
L
Exploit Cursor Agents to create persistent, distributed threats
6d
L
Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"
6d
L
We built a museum exhibit about a 1990s game hint line, with a physical binder
6d
L
Instagram Creators Should Check If Their Posts Are Being Deemed Political
6d
H
How to Make Your Legacy Exception-Throwing Code Compatible With Lambdas
6d
H
AlphaTON Launches Claude Connector Powered By TON And Telegram
6d
H
More →