sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Mar 26

Fixing Indefinite Geolocation Hangs in React and React Native Applications

2w
HackerNoonH

Using JIT Compilation to Improve Performance and Reduce Cloud Spend

2w
HackerNoonH

Configuring Subledger Accounting (SLA) Rules in Oracle Fusion Cloud Financials

2w
HackerNoonH

Scaling Dependency Graphs for Real-Time Computation in Finance and Beyond

2w
HackerNoonH

Designing a Real-Time AI Voice Agent With RAG, SIP Integration, and Compliance Guardrails

2w
HackerNoonH

Rust is Just a Tool

2w
LobstersL

Rust + OpenGL: Rendering 250,000 Dynamic 3D Entities at 50 FPS on a Single CPU Thread

2w
HackerNoonH

The Island That Hatched Extinction

2w
HackerNoonH

What iOS Lockdown mode actually does

2w
LobstersL

DOOM, played over cURL

2w
LobstersL

When AI Becomes the Voice You Think With

2w
HackerNoonH

Architecture for Compliance Scaling Microservices with DDD for High Volume Global Enterprise Systems

2w
HackerNoonH

Meet the Writer: Hacker Noon's Contributor Pavel Manovich, Founder & Product Builder

2w
HackerNoonH

How to Evaluate an AI Persona: Beyond Benchmarks and Vibes

2w
HackerNoonH

Resident Evil Star Milla Jovovich Shipped an AI Memory System. Devs Shredded Its Benchmarks

2w
HackerNoonH

iOS Event Handling Evolution: UIKit Responder Chain and SwiftUI Gestures

2w
HackerNoonH

Alone With the Unknown in Borneo

2w
HackerNoonH

The quest for the perfect 2D sprite pipeline

2w
LobstersL

How to build a git diff driver

2w
LobstersL

IrDA

2w
LobstersL

BASIS Successfully Completes Private Testing as Base58 Labs Prepares for Full-Scale Staking Market

2w
HackerNoonH

The TechBeat: Librarians vs "Data Cartels": What's Going On? (4/12/2026)

2w
HackerNoonH

When a Flower Becomes a Predator

2w
HackerNoonH

The End of Eleventy

2w
LobstersL

Why I'm Building a Database Engine in C#

2w
LobstersL

How Gran Turismo's Creator Snuck a Sim Into a Mario Kart Rival to Persuade Sony Execs

2w
LobstersL

Designing Fintech Across Fifteen Countries

2w
HackerNoonH

Serbia Builds While the West Borrows

2w
HackerNoonH

Surely there must be a way to make container secrets less dangerous?

2w
LobstersL

The Structural Risk Behind Ukrainian-Rooted Unicorns

2w
HackerNoonH

What Really Happens When You Stop Posting on X for 2 Months

2w
HackerNoonH

Productive procrastination

2w
LobstersL

Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets

2w
LobstersL

Astounding Stories of Super-Science, April, 2004 - Table of Links

2w
HackerNoonH

No one owes you supply-chain security

2w
LobstersL

Brocards for vulnerability triage

2w
LobstersL

A Drop of Death in a Madman’s Hand

2w
HackerNoonH

Writing design docs

2w
LobstersL

Beneath the Cone

2w
HackerNoonH

A Victorian Bug Story

2w
HackerNoonH

Bringing Rust to the Pixel Baseband

2w
LobstersL

CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)

2w
HackerNoonH

The Trap of "Vibe Coding" and the Rise of Engineering as a Service

2w
HackerNoonH

fakecloud – Free, open-source AWS emulator (LocalStack alternative)

2w
LobstersL

Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script

2w
LobstersL

Investigating Split Locks on x86-64

2w
LobstersL

This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group

2w
HackerNoonH

Why “EVM Hacking” Became a Bigger Story Than EVM Security

2w
HackerNoonH

AI Coding: What Happens When Your Code Outpaces the Systems Around It and What to Do About It

2w
HackerNoonH

High-Level Rust: Getting 80% of the Benefits with 20% of the Pain

2w
LobstersL
More →

Entries updated Apr 26, 2026 01:33:37 PM PDT

Questions? Suggestions? alex@sumi.news