sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Fri Apr 10

Idempotency Is Easy Until the Second Request Is Different

17h
LobstersL

The Intolerable Hypocrisy of Cyberlibertarianism

17h
LobstersL

Fast Fourier Transforms Part 1: Cooley-Tukey

17h
LobstersL

The Valley Beneath

17h
HackerNoonH

A Block Editor Is Not Just a Text Field

18h
HackerNoonH

GoMining Launches GoBTC Pay to Bring Native Instant Payments to Bitcoin

18h
HackerNoonH

I Thought AI Image Detection Needed a GPU Cluster. It Was Just Metadata

18h
HackerNoonH

AI Made It Easy to Look Like a Builder. Shipping Is Still Hard

19h
HackerNoonH

Cybersecurity in 2026 and Beyond: Trends Everyone Should Know

19h
HackerNoonH

Turn Your Postman Collection Into Pytest Tests With One Command

19h
HackerNoonH

How Writing Helps Developers Think Clearly

19h
HackerNoonH

How AI Is Changing the Role of .NET Developers

19h
HackerNoonH

Figma’s Collapse Should Terrify SaaS Leaders

19h
HackerNoonH

A principled rethinking of array languages like APL

20h
LobstersL

AI is Breaking Two Vulnerability Cultures

20h
LobstersL

Relational modeling and APL

21h
LobstersL

Point-Free Logic Programming

21h
LobstersL

Unlocking sudoku's secrets (2025)

22h
LobstersL

Flipping the bozo bit on flips the learning off

1d
LobstersL

On DOS, floppies, NetBSD and nostalgia

1d
LobstersL

87 Blog Posts To Learn About Machine Learning Tutorials

1d
HackerNoonH

Abstract Machines for Logic Programs

1d
LobstersL

Aurora: A Leverage-Aware Optimizer for Rectangular Matrices

1d
LobstersL

Designing High-Performance Workflow Systems with SLA and Agent Processing

1d
HackerNoonH

Three Cultures of Math

1d
LobstersL

The Android Fuzzing Pivot That Cut Costs and Found Better Bugs

1d
HackerNoonH

The Browser Security Breakthrough That Made UAF Exploits Harder

1d
HackerNoonH

Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)

1d
LobstersL

500 Blog Posts To Learn About Llms

1d
HackerNoonH

Where Have All the Complex Windows Malware and Their Analyses Gone?

1d
LobstersL

Laptops all have built-in security tokens these days

1d
LobstersL

ACME CA Comparison

1d
LobstersL

Notes on using GNU Emacs' Tramp system in an unusual shell environment

1d
LobstersL

Fixing QuickLook (2023)

1d
LobstersL

FFmpeg: The Incredible Technology Behind Video on the Internet

1d
LobstersL

Yggdrasil Network as an Embedded Go Library

1d
LobstersL

Hacking Time: Spoofing Atomic Clocks with Audio Harmonics

1d
LobstersL

My Agentic Trust Issues: From Prompt Injection to Supply-Chain Compromise on gemini-cli

1d
LobstersL

Zoomex Launches the World’s First Zero-Cost Trading Competition: Let Skill Be Your Only Asset

1d
HackerNoonH

I Will Not Add Query Strings to Your URLs

1d
LobstersL

The HackerNoon Newsletter: Nerdy Men Are Having Their Main Character Moment (5/9/2026)

1d
HackerNoonH

WebRTC is the Problem

1d
LobstersL

The React2Shell Story and What Happened Next.js

1d
LobstersL

The TechBeat: How to Build Production-Ready Agentic AI Systems with TypeScript (5/9/2026)

1d
HackerNoonH

212 Blog Posts To Learn About Llm

1d
HackerNoonH

Nerdy Men Are Having Their Main Character Moment

1d
HackerNoonH

On forking the Web

1d
LobstersL

Second Life of Hedon

1d
HackerNoonH

Rome.exe

1d
HackerNoonH

Inflorescence – A cross-platform native GUI for Pijul

1d
LobstersL
More →

Entries updated May 10, 2026 06:23:26 PM PDT

Questions? Suggestions? alex@sumi.news