sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat Jan 17
Building a Production-Ready Traffic Violation Detection System with YOLOv8 and DeepSORT
6d
H
The $5 Billion Blind Spot: Why PropTech Needs a "Biological Data Layer"
6d
H
Testing a Component System Like Infrastructure: Contract Tests, Visual Regression, and Accessibility Gates
6d
H
The Design Checklist: Keeping AI Products Alive After Week One
6d
H
Semantic Design Tokens That Scale Across Platforms
6d
H
Your Cross-Platform UI Isn’t “Parity”—It’s Drift With Matching Pixels
6d
H
Design Systems Don’t Die — They Freeze. Here’s the Migration Playbook
6d
H
The Secure Force: Building an End-to-End SDLC Without Breaking the Bank
6d
H
polluSensWeb Earns a 46 Proof of Usefulness Score by Building a Browser-Based UART Sensor Tool
6d
H
The Musk-OpenAI Lawsuit: Humanity's Eternal Flaws in the AI Era
6d
H
simple email API for protonmail custom domains via proton bridge
6d
L
How to level up the fediverse
6d
L
Hope Is Not a Security Strategy: Why Secure-by-Default Beats Hardening
6d
L
Google Chrome 145 Released With JPEG-XL Image Support
6d
L
Hylo: A Systems Programming Language All in on Value Semantics and Generic Programming
6d
L
This AI Tool Turns 400 Informal Names Into Accurate OMOP Code
6d
H
Llettuce: The AI Tool Mapping Messy Medical Records to Standard Code
6d
H
The Day the telnet Died
6d
L
How This Open-Source AI Simplifies Mapping Healthcare Data
6d
H
How Often Does the Agent Misinterpret the User’s Intent — and Is It Correctable?
6d
H
How to Bridge the Gap Between Specs and Agents: MLOps Coding Skills
6d
H
What They Copied
6d
L
Ethereum’s Sticky Dominance: Why DeFi Still Runs on Vitalik’s Tracks
6d
H
AI Model Forensics: The Source of Suspicious Text-to-Image AI
1w
H
How to Spot Unauthorized Use of AI-Generated Images Without Changing the Model
1w
H
Researchers Can Now Identify If Your AI Stole Its Training Data
1w
H
cysqlite - a new sqlite driver
1w
L
Ravasend Earns a 49 Proof of Usefulness Score by Building Instant Crypto-to-Fiat Settlement for Emerging Markets
1w
H
Setting Up Zed
1w
L
Go 1.26 is released
1w
L
When Compute Stops Being Infrastructure and Starts Behaving Like a Market
1w
H
TimeVyn Earns a 36 Proof of Usefulness Score by Building a Privacy-First SocialFi Protocol
1w
H
The Eight Revenue Levers Powering the World’s Best Tech Companies
1w
H
How I built Fluxer, a Discord-like chat app
1w
L
USSD at Scale: Powering Healthcare Access Across Africa
1w
H
The Missing GitHub Status Page
1w
L
Prediction Markets Are Swallowing the Real World
1w
H
Inside the Dataset Powering the Next Generation of AI Text Detection
1w
H
The Commercialization Trap: What Happens When Subculture Goes Mainstream
1w
H
A New Model That Actually Works: Why Today’s AI Detectors Fail
1w
H
How to Build Smooth iOS Transitions That Don't Break User Flow
1w
H
Inside the Model That Outsmarts Popular AI Detection Tools
1w
H
I Started Programming When I Was 7. I'm 50 Now, and the Thing I Loved Has Changed
1w
L
Spec-driven development doesn't work if you're too confused to write the spec
1w
L
The Next Great Engineering Frontier : The Hidden Complexity of Physical AI
1w
H
x402 vs UCP: What Challenges Lie Ahead for AI Agent Commerce?
1w
H
Handwriting vs AI: Real Performance of AI on Handwritten Documents
1w
H
Dave Farber RIP
1w
W
The End of CI/CD Pipelines: The Dawn of Agentic DevOps
1w
H
GTK hackfest, 2026 edition (GTK Development Blog)
1w
W
More →