sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Thu Feb 26
When Supply Is Just Code: Why Traditional Supply & Demand Shouldn't Apply to Digital Money
3d
H
Mongo Lens Earns a 46 Proof of Usefulness Score by Building a Powerful Mobile MongoDB Client
3d
H
The forge is our new home (Fedora Community Blog)
3d
W
How OP_NET Enables Smart Contracts on Bitcoin Without Layer 2s
3d
H
[$] Vibe-coded ext4 for OpenBSD
3d
W
Don’t trust software, verify it
3d
L
Can Subsidized Gas Fees Finally Make Everyday Crypto Transfers Practical?
3d
H
When Vectorized Arrays Aren't Enough
3d
L
Choosing the Best SERP API for Local SEO: City-Level & “Near Me” Results
3d
H
Security updates for Thursday
3d
W
Chaitin's constant
3d
L
Two studies in compiler optimisations
3d
L
CVE-2026-33017: Unauthenticated RCE in Langflow’s Public Flow Endpoint Explained
3d
H
Optimization lessons from a Minecraft structure locator
3d
L
How to Start a Video Streaming Business and Monetize It
3d
H
CESIL and other programming languages
3d
L
Hashed Invests in GCC's First Collectibles Grading & Authentication Company "HiT"
3d
H
Deploying Go Apps to Google Cloud Run
3d
L
Why a Simple QR Code Could Fix a Huge Accessibility Gap for Deaf People
3d
H
Model Poisoning Turns Helpful AI Into a Trojan Horse
3d
H
This Cheap OTG Hack Made My Phone Feel Like a PC
3d
H
The Missing Layer in AI Reliability: Replayable Requests
3d
H
A 56,000-Star AI App Shipped With a Textbook SQL Injection Flaw
3d
H
This Perplexity Embedding Model Understands Chunks in Context
3d
H
Wealth Is Moving Beyond London, New York, and Zurich
3d
H
The Synthetic Web Could Break AI From Within
3d
H
MCP Is Dead. The CLI Is Winning the AI Agent Stack
3d
H
Engineers do get promoted for writing simple code
3d
L
Luxury’s Lost Decade Begins as 50 Million Shoppers Exit the Market
3d
H
NVIDIA’s Nemotron-3 Super 120B FP8 Targets Agentic Workflows at Scale
3d
H
NVIDIA Nemotron-3 Super 120B Targets Agentic AI at Scale
3d
H
4 Tactics for Shipping Faster Without Losing Software Quality
3d
H
How to Break Your PostgreSQL IIoT Database and Learn Something in the Process
3d
H
Why Enterprises Choose PySpark for Real-Time Big Data Analytics
3d
H
Hidden Truth
3d
H
What the Strangler Fig Pattern Teaches Us About Modernizing Legacy Software
3d
H
Gateway Security Won’t Be Enough for MCP-Powered AI
3d
H
Fish Audio’s S2-Pro Brings Emotion Tags to Text-to-Speech
3d
H
Fedora moving from Pagure to Forgejo
3d
L
This 4B Safety Model Classifies AI Content as Safe, Unsafe, or Controversial
3d
H
Phase 2 Calibration: Fixing Gating and Reward Scoring Together
3d
H
Why CIC Private Debt’s Risk Hire Matters More Than It Looks
3d
H
Node.js — Developing a minimally HashDoS resistant, yet quickly reversible integer hash for V8
3d
L
Large-scale online deanonymization with LLMs
3d
L
Lines of code are useful
3d
L
Vim Racing
3d
L
Zero-copy protobuf and ConnectRPC for Rust
3d
L
A Verilog to Factorio compiler and simulator (working RISC-V CPU)
3d
L
Electric Motorcycles are a Security Nightmare
3d
L
Read Receipts: An iMessage Simulator
3d
L
More →