sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Sat Jan 31
Why Integrate Dandelion++ Onto the Beldex Network?
15h
H
Kilo CLI 1.0: The Complete CLI for Agentic Engineering
15h
H
SecurityMetrics Announces Suite of CMMC Solutions for Defense Contractors of All Sizes
16h
H
TurboSparse: Elite Inference Speed via dReLU Sparsity
16h
H
TurboSparse Inference Speedup: PowerInfer Integration for Real-Time LLM Decoding
16h
H
TurboSparse Efficiency: Achieving 97% Parameter Sparsity in Mixtral-47B
16h
H
Detecting LLM-Generated Web Novels Using "Classical" Machine Learning (AIGC Text Detection)
17h
L
Evolving Typst
17h
L
The 185-Microsecond Type Hint
17h
L
A Hallucination Is a Gap in AI Knowledge
17h
H
PEP 827 – Type Manipulation
18h
L
AI Code Generation: Cheap to Create, Expensive to Fix
18h
H
How “Open-Claude”-Style Systems Are Transforming Work, Life, and Business
20h
H
[$] The ongoing quest for atomic buffered writes
21h
W
The Difference Between EnvironmentObject, StateObject, ObservedObject & Observable
21h
H
The “Best Practice” Trap
22h
H
Compose Drawing Mastery - Part 2 - Transformations
22h
H
How I Built a Full AI Studio for 6GB VRAM Cards (In 9 Hours of AI-Assisted Chaos)
22h
H
The two kinds of error
22h
L
A Secure Architecture for AI-Powered Natural Language Analytics Over Enterprise Data Warehouses
22h
H
Shopify's Secret to Handling Billions in Sales
22h
H
Plasma Bigscreen - 10-foot interface for KDE plasma
22h
L
When AI Goes Live, Control Becomes the Real Problem
22h
H
State of Haskell 2025 results
22h
L
The Math Behind the Match: Building Production Search for People Names
22h
H
getopt: Go package for POSIX/GNU-style command line parsing
23h
L
Beyond Pandas: Architecting High-Performance Python Pipelines
23h
H
Høiland-Jørgensen: The inner workings of TCP zero-copy
23h
W
MCP Security in 2026: Lessons From Real Exploits and Early Breaches
23h
H
Embeddings Aren’t Magic: The Geometry of How Vectors Encode Meaning
23h
H
Your SAST tool is blind to the biggest AI threat. Why we need to scan Data, not just Code
23h
H
The “Hate List” Is a Faster Compass Than Passion
23h
H
AlphaTON Capital Strengthens Engineering Core with Appointment of TON Ecosystem Visionaries
23h
H
Free IP Geolocation Database
23h
L
You can't always fix it
23h
L
I Fuzzed, and Vibe Fixed, the Vibed C Compiler
1d
L
2328.io Launches International Crypto Payment Infrastructure for Online Businesses
1d
H
Texinfo 7.3 released
1d
W
Swap to QIE for Free: QIE Wallet Rolls Out Major Integrations, ISIN Approval and March Upgrades
1d
H
Make A Choice, Tiger
1d
H
Quantifying the Swiss marriage tax
1d
L
Everything Software Developers Need to Know About Cryptography
1d
H
Reverse engineering “Hello World” in QuickBASIC 3.0
1d
L
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat
1d
H
The Generative AI Policy Landscape in Open Source
1d
L
Farewell, Felix
1d
L
Merkle Trees 101 (Part 1): Structure, Proofs, and Real-World Uses
1d
H
Exploring and Modernizing The VFX Methods of Diablo 3
1d
L
Why Edge Computing Is Becoming Critical for AI, IoT and Real-Time Systems
1d
H
AI Agents and the End of Artisan Coding
1d
H
More →