sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Wed Mar 18

Designing Fintech Across Fifteen Countries

6d
HackerNoonH

Serbia Builds While the West Borrows

6d
HackerNoonH

Surely there must be a way to make container secrets less dangerous?

6d
L

The Structural Risk Behind Ukrainian-Rooted Unicorns

6d
HackerNoonH

What Really Happens When You Stop Posting on X for 2 Months

6d
HackerNoonH

Productive procrastination

6d
L

Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets

6d
L

Astounding Stories of Super-Science, April, 2004 - Table of Links

6d
HackerNoonH

No one owes you supply-chain security

6d
L

Brocards for vulnerability triage

6d
L

A Drop of Death in a Madman’s Hand

6d
HackerNoonH

Writing design docs

6d
L

Beneath the Cone

6d
HackerNoonH

A Victorian Bug Story

6d
HackerNoonH

Bringing Rust to the Pixel Baseband

6d
L

CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)

6d
HackerNoonH

The Trap of "Vibe Coding" and the Rise of Engineering as a Service

6d
HackerNoonH

fakecloud – Free, open-source AWS emulator (LocalStack alternative)

6d
L

Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script

6d
L

Investigating Split Locks on x86-64

6d
L

This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group

6d
HackerNoonH

Why “EVM Hacking” Became a Bigger Story Than EVM Security

6d
HackerNoonH

AI Coding: What Happens When Your Code Outpaces the Systems Around It and What to Do About It

6d
HackerNoonH

High-Level Rust: Getting 80% of the Benefits with 20% of the Pain

6d
L

A set of Saturday stable kernel updates

6d
Welcome to LWN.net [LWN.net]W

EU's EES fingerprint and photo travel rules come into force

6d
L

Git fixup is magic (and Magit is too)

6d
L

Debunking Classical Pseudo-Paradoxes of Logic

6d
HackerNoonH

Using Wireshark to reverse-engineer a USB device

6d
L

Analyzing KDE Project Health With git

6d
L

How passive radar works

6d
L

SQLite 3.53.0

6d
L

Windows Defender is being used to hack Windows

6d
L

I Just Want Simple S3

6d
L

Why Do We Tell Ourselves Scary Stories About AI?

6d
L

Linux Kernel AI Coding Assistants Policy

6d
L

Write less code, be more responsible

6d
L

How Rust is susceptible to supply chain attacks and what we can do to mitigate the inevitable

6d
L

20 Years on AWS and Never Not My Job

6d
L

The TechBeat: Build a real-time medical transcription analysis app with AssemblyAI and LLM Gateway (4/11/2026)

6d
HackerNoonH

With AI, you barely need a frontend framework

6d
L

Advanced Mac Substitute

6d
L

Agentic AI Could Break the Old Rules of Job Displacement

6d
HackerNoonH

Batman: Arkham Knight - All of the Arkham Episodes Ranked

1w
HackerNoonH

Machine Learning Has a Trust Problem, Not a Talent Problem

1w
HackerNoonH

A bet on whether ML-KEM-768 or X25519 will break first

1w
L

The Remote Work Fantasy Breaks in Real Life

1w
HackerNoonH

Georgia’s Neutrality Is Becoming a Private Capital Risk

1w
HackerNoonH

How ADHD and AI Work Together Better Than Any Productivity System I Tried

1w
HackerNoonH

Zero-Fee Crypto Swaps Are the Most Expensive Trades You Will Ever Make

1w
HackerNoonH
More →

Entries updated Apr 17, 2026 06:18:39 PM PDT

Questions? Suggestions? alex@sumi.news