Codetown ::: a software developer's community
15 members
8 members
16 members
Is there any knowledge on the horizon on integrating JavaFX into Netbeans in the same way Swing is integrated into it? Currently, as I know it, you can generated a JavaFX gui - which generates a…Continue
Started Dec 11, 2012
Mike Bivins has not received any gifts yet
Posted on February 1, 2013 at 11:13am 0 Comments 1 Like
It may not adhere to the strict Java format of OJUG but was quite useful in learning more of the growing tools available to the web based developer.
Jackie Gleason answered this and unlocked other mysteries when he explained what NODE.JS was about. Including a demo where he started a .js server, Jackie showed us how to set up an Express Project Layout worked starting with NPM and yielding to his own "Hello World" page. He continued by showing us how document styled db could be…
Posted on January 22, 2013 at 12:02pm 0 Comments 1 Like
Not familiar with FLEX but this article has some interesting info on it. Another tool in the web developer's toolbox?
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.
By Steef-Jan Wiggers
At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.
By Melvin Philips
Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.
By Craig Risi
A recent paper from Anthropic examines how large language models internally represent concepts related to emotions and how these representations influence behavior. The work is part of the company’s interpretability research and focuses on analyzing internal activations in Claude Sonnet 4.5 to understand the mechanisms behind model responses better.
By Robert Krzaczyński
Randy Shoup discusses the "Velocity Initiative," a transformation that doubled engineering productivity and modernized eBay’s DORA metrics. He shares the technical playbook used to scale 4,500 services while explaining why even elite engineering execution can’t save a company hampered by waterfall planning, risk aversion, and a "pathological" culture of fear.
By Randy Shoup
© 2026 Created by Michael Levin.
Powered by
Comment Wall (1 comment)
You need to be a member of Codetown to add comments!
Join Codetown
If someone with multiple personalities threatens suicide, is that considered a hostage situation?