sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Programming RSS Feed

  • sumi.news
  • Programming

  • Latest
  • Thu Apr 16

The New Rules of Search in the Age of AI Answers

2d
HackerNoonH

How Learning in Public Speeds Up Developer Growth

2d
HackerNoonH

Stop Letting Coding Agents Search the Same Docs Every Day

2d
HackerNoonH

The Real Cost of a Bus Factor of One

2d
HackerNoonH

How Building a Personal Brand Early Opens Doors for Student Developers

2d
HackerNoonH

The Hidden Cost of Letting AI Agents Ship Your Code

2d
HackerNoonH

Static Mockups Are Failing Dynamic Products

2d
HackerNoonH

How I Turned My Website Into an SSH Terminal App

2d
HackerNoonH

Why Great Security Products Fail at Scale: When Protection Works but the Product Doesn’t

2d
HackerNoonH

Mullvad exit IPs as a fingerprinting vector

2d
LobstersL

Prolog Basics Explained with Pokémon

2d
LobstersL

500 Blog Posts To Learn About Science Fiction

2d
HackerNoonH

The TPM Who Pulls Her Own Data

2d
HackerNoonH

I Built an AI That Watches My Screen and Tells Me If I Did It Right

2d
HackerNoonH

linux 0-day, access root-owned files as an unprivileged user

2d
LobstersL

Shell Tool Testing

2d
LobstersL

In what way if any are you a tech minimalist while maintaining your job/love for tech?

2d
LobstersL

Porting 3D Movie Maker to Linux

2d
LobstersL

A Simple Runtime Invariant Miner

2d
LobstersL

Amazonbot is finally respecting robots.txt

2d
LobstersL

int a = 5; a = a++ + ++a; a = ? (2011)

2d
LobstersL

Building a Mission-Critical Integration Blind, Part I: XML, Queues, and Guesswork

2d
HackerNoonH

Native DeepCloner vs. Manual Serialization: What You Need to Know

2d
HackerNoonH

Using Docker Compose for AI Agent Development

2d
HackerNoonH

Why Multi-Tab Browser Apps Quietly DDoS Their Own Backends

2d
HackerNoonH

Designing Zero-Trust Remote Access for Thousands of Devices

2d
HackerNoonH

Core Team Panel - Gleam Gathering 2026

2d
LobstersL

224 Blog Posts To Learn About Robotics

2d
HackerNoonH

PostgreSQL 18.4, 17.10 closing 11 CVEs

2d
LobstersL

MapleStory Universe Marks One Year of Live Ops, Surpasses 150M On-chain Transactions, Entering MSU 2

2d
HackerNoonH

BTSE Bhutan Receives In-Principle Approval for Digital Asset Trading and Custody Services License

2d
HackerNoonH

[$] Policy groups for memory management

2d
Welcome to LWN.net [LWN.net]W

Underactuated Gripper Results: Sim-to-Real Verification

2d
HackerNoonH

Spam Resistant Forges

2d
LobstersL

First public macOS kernel memory corruption exploit on Apple M5

2d
LobstersL

SQL’s ORDER BY Has Come a Long Way

2d
LobstersL

Linux Compromises, Broken Embargoes, and the Shrinking Patch Window

2d
LobstersL

"This is written by an LLM" comments should be flagged as off-topic

2d
LobstersL

How I Moved My Digital Stack to Europe

2d
LobstersL

The HackerNoon Newsletter: How to Add AI Scoring and Email Verification to Your E2E Suite (5/14/2026)

2d
HackerNoonH

HDD Firmware Hacking Part 1

2d
LobstersL

LibreOps

2d
LobstersL

The element as a trap

2d
LobstersL

C++26 Shipped a SIMD Library Nobody Asked For

2d
LobstersL

Game On For Esports Jobs: 65% Globally Demand More Education And Career Pathways For Pro Gaming

2d
HackerNoonH

How to Add AI Scoring and Email Verification to Your E2E Suite

2d
HackerNoonH

How to Know If Your Startup Is Solving a Real Problem

2d
HackerNoonH

[$] Buffered atomic writes, writethrough, and more

2d
Welcome to LWN.net [LWN.net]W

Three stable kernels for Thursday

2d
Welcome to LWN.net [LWN.net]W

Passwords suck. Can passkeys replace them?

2d
LobstersL
More →

Entries updated May 16, 2026 11:50:28 PM PDT

Questions? Suggestions? alex@sumi.news