Tricia
  • Female
Share on Facebook MySpace
  • Blog Posts
  • Discussions
  • Events
  • Groups (1)
  • Photos
  • Photo Albums
  • Videos

Tricia's Groups

 

Tricia's Page

Gifts Received

Gift

Tricia has not received any gifts yet

Give Tricia a Gift

Profile Information

How did you hear about Codetown?
Mike Levin
What are your main interests in software development?
Recruiting Software Development professionals
Do you have a website?
http://abtsolutions.com

Comment Wall (1 comment)

You need to be a member of Codetown to add comments!

Join Codetown

At 8:00pm on March 11, 2010, Michael Levin said…
Hey, Tricia! Glad you made it to Codetown! Maybe you can drop by the meeting at the OJUG this month and introduce yourself. I'm excited about finally meeting you in person. All the best, Mike
 
 
 

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Comprehensive Approaches to Software Supply Chain Security

Mykhailo Brodskyi discusses critical software supply chain security risk categories relevant to FinTech and explains effective mitigation strategies. Drawing from real project case studies, he shares insights to protect systems from vulnerabilities and ensure platform security and resilience. Demo: third-party library risk mitigation through software bill of materials generation and analysis.

By Mykhailo Brodskyi

Article: Shadow Table Strategy for Seamless Service Extractions and Data Migrations

The shadow table strategy creates a synchronized duplicate of the data that keeps the production system fully operational during changes, enabling zero-downtime migrations. The approach supports diverse scenarios - including database migrations, microservices extractions, and incremental schema refactoring - that update live systems safely and progressively.

By Apoorv Mittal

Optimize AI Workloads: Google Cloud’s Tips and Tricks

Google Cloud has announced a suite of new tools and features designed to help organizations reduce costs and improve efficiency of AI workloads across their cloud infrastructure. The announcement comes as enterprises increasingly seek ways to optimize spending on AI initiatives while maintaining performance and scalability.

By Claudio Masolo

QCon London: A Three-Step Blueprint for Managing Open Source Risk

At QCon London 2025, Johnson Matthey's Vulnerability Manager, Celine Pypaert, discussed managing open-source dependency risks while maintaining momentum in innovation. She described a three-part blueprint for handling the security challenges that arise with the now widespread use of open-source dependencies.

By Matt Saunders

Kafka 4.0: KRaft Simplifies Architecture

Apache Kafka 4.0 ushers in a transformative era by adopting KRaft mode, eliminating the need for ZooKeeper, streamlining architecture, and enhancing scalability. With a next-gen consumer group protocol for improved performance and early access to point-to-point messaging, Kafka solidifies its role in modern data streaming. Elevate your data infrastructure with Kafka’s innovative advancements!

By Steef-Jan Wiggers

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service