sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Sat Apr 4

How LLMs Distort Our Written Language

1d
LobstersL

Is form design easy?

1d
LobstersL

IBM’s Granite Embedding Model Gets a Multilingual Upgrade

1d
HackerNoonH

the tragedy of gethostbyname (2022)

1d
LobstersL

In the Lab: Inside Brave Origin & Containers

1d
LobstersL

Do AI summaries hurt critical thinking?

1d
LobstersL

Integrating External ML Models Into Pega Decisioning Systems

1d
HackerNoonH

The Machine That Doesn't Need a Cage

1d
HackerNoonH

Writing middlewares for Rust Lambda functions

1d
LobstersL

What are you doing this week?

1d
LobstersL

Netizen

1d
LobstersL

Native macOS app to track YouTube channels, no Google login required

1d
LobstersL

Reminder: You Can Stitch Together Lots of Little HTML Pages With Navigations For Interactions

1d
LobstersL

I accidentally made law enforcement shut down their stresser honeypot

1d
LobstersL

Kernel prepatch 7.1-rc2

1d
Welcome to LWN.net [LWN.net]W

RaTeX: LaTeX math renderer in Rust

1d
LobstersL

Designing microkernel IPC

1d
LobstersL

228 Blog Posts To Learn About Data Visualization

1d
HackerNoonH

Continuing the story of early DOS development

1d
LobstersL

On (not) using “cryptographic hashes” for hash table keys

1d
LobstersL

Blue Ridge Ruby 2026

1d
LobstersL

dithering with css

1d
LobstersL

Agentic Coding is a Trap

1d
LobstersL

Broadcasting GPS on the local network

1d
LobstersL

123 Blog Posts To Learn About Data Structures

2d
HackerNoonH

The Case for PMs Owning Infrastructure

2d
HackerNoonH

AI Coding Tip 018 - Dictate Your Prompts Instead of Typing Them

2d
HackerNoonH

How to Design Offer Engines That Optimize for Real Business Value

2d
HackerNoonH

Top 5 Myths About RAG-Powered Fraud Detection in Modern Financial Systems

2d
HackerNoonH

This Wasm interpreter fits in a QR code

2d
LobstersL

Fake Notepad++ for Mac

2d
LobstersL

File-to-Markdown Conversion Is Becoming an AI Input Layer: Here's Why

2d
HackerNoonH

A Derivative is Just a Function

2d
HackerNoonH

For thirty years I programmed with Phish on, every day. In 2026, the music is out of phase with the work

2d
LobstersL

How a Broken Bike Sync Led Me to Reverse Engineering My Wahoo’s Hidden Debug Mode

2d
LobstersL

The HackerNoon Newsletter: The True Danger of AI (5/3/2026)

2d
HackerNoonH

Your Container Is Not a Sandbox

2d
LobstersL

C8s: A Confidential Kubernetes Architecture

2d
LobstersL

A desktop made for one

2d
LobstersL

Building Software for AI Agents and Human Users

2d
HackerNoonH

Bloom Filters Are the Reason Your Distributed Cache Is Lying to You

2d
HackerNoonH

Designing High-Performance Workflow Systems with SLA and Agent Processing

2d
HackerNoonH

The TechBeat: How ClawBank Is Turning Bureaucratic Paperwork Into the Next Open API for AI Agents (5/3/2026)

2d
HackerNoonH

How to Build a Reactive SPA by Using PHP, Twig, and JavaScript via Stimulus: Part Two

2d
HackerNoonH

55 Blog Posts To Learn About Data Structures And Algorithms

2d
HackerNoonH

git-async web demo - A git browser in the browser

2d
LobstersL

Minimal Viable Zig Error Contexts

2d
LobstersL

Improving Customer Experience with Next Best Action in Pega

2d
HackerNoonH

The Architectural Migration: Equipping Autonomous Software with Programmable Money

2d
HackerNoonH

My favorite device is a Chromebook, without ChromeOS

2d
LobstersL
More →

Entries updated May 5, 2026 01:07:22 PM PDT

Questions? Suggestions? alex@sumi.news