sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Mon Mar 16
How to Optimize Market Data APIs for Millisecond-Level Trading Performance
3d
H
How Crypto.com Landed the First Ever UFC Fight Night on the White House Lawn
3d
H
Fixing Indefinite Geolocation Hangs in React and React Native Applications
3d
H
Using JIT Compilation to Improve Performance and Reduce Cloud Spend
3d
H
Configuring Subledger Accounting (SLA) Rules in Oracle Fusion Cloud Financials
3d
H
Scaling Dependency Graphs for Real-Time Computation in Finance and Beyond
3d
H
Designing a Real-Time AI Voice Agent With RAG, SIP Integration, and Compliance Guardrails
3d
H
Rust is Just a Tool
3d
L
Rust + OpenGL: Rendering 250,000 Dynamic 3D Entities at 50 FPS on a Single CPU Thread
3d
H
The Island That Hatched Extinction
3d
H
What iOS Lockdown mode actually does
3d
L
DOOM, played over cURL
3d
L
When AI Becomes the Voice You Think With
3d
H
Architecture for Compliance Scaling Microservices with DDD for High Volume Global Enterprise Systems
3d
H
Meet the Writer: Hacker Noon's Contributor Pavel Manovich, Founder & Product Builder
3d
H
How to Evaluate an AI Persona: Beyond Benchmarks and Vibes
3d
H
Resident Evil Star Milla Jovovich Shipped an AI Memory System. Devs Shredded Its Benchmarks
3d
H
iOS Event Handling Evolution: UIKit Responder Chain and SwiftUI Gestures
3d
H
Alone With the Unknown in Borneo
3d
H
The quest for the perfect 2D sprite pipeline
3d
L
How to build a git diff driver
3d
L
IrDA
4d
L
BASIS Successfully Completes Private Testing as Base58 Labs Prepares for Full-Scale Staking Market
4d
H
The TechBeat: Librarians vs "Data Cartels": What's Going On? (4/12/2026)
4d
H
When a Flower Becomes a Predator
4d
H
The End of Eleventy
4d
L
Why I'm Building a Database Engine in C#
4d
L
How Gran Turismo's Creator Snuck a Sim Into a Mario Kart Rival to Persuade Sony Execs
4d
L
Designing Fintech Across Fifteen Countries
4d
H
Serbia Builds While the West Borrows
4d
H
Surely there must be a way to make container secrets less dangerous?
4d
L
The Structural Risk Behind Ukrainian-Rooted Unicorns
4d
H
What Really Happens When You Stop Posting on X for 2 Months
4d
H
Productive procrastination
4d
L
Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets
4d
L
Astounding Stories of Super-Science, April, 2004 - Table of Links
4d
H
No one owes you supply-chain security
4d
L
Brocards for vulnerability triage
4d
L
A Drop of Death in a Madman’s Hand
4d
H
Writing design docs
4d
L
Beneath the Cone
4d
H
A Victorian Bug Story
4d
H
Bringing Rust to the Pixel Baseband
4d
L
CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)
4d
H
The Trap of "Vibe Coding" and the Rise of Engineering as a Service
4d
H
fakecloud – Free, open-source AWS emulator (LocalStack alternative)
4d
L
Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script
4d
L
Investigating Split Locks on x86-64
4d
L
This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group
4d
H
Why “EVM Hacking” Became a Bigger Story Than EVM Security
4d
H
More →