Developer Day - Boulder, CO

Event Details

Developer Day - Boulder, CO

Time: October 10, 2009 all day
Location: Boulder
Street: 14th and Walnut St
City/Town: Boulder, CO 80302
Website or Map: http://developer-day.com/ and…
Phone: bscofield@developer-day.com
Event Type: conference
Organized By: Developers in Boulder!
Latest Activity: Oct 7, 2009

Export to Outlook or iCal (.ics)

Event Description

Developer Day was born out of the realization that there's a huge amount of development talent and experience spread across the country, and there's absolutely no need to spend a lot of money to get together and learn from each other. Furthermore, so many of the venues for assembling geeks are focused on a single technology. We need less specialization right now, and more places to talk to people for whom tools are tools, but tech is king. When you want to talk to Ruby geeks, head out to RubyFringe or Ruby Hoedown. When Java is on top, catch an NFJS, or JavaOne. But where are you to go when you just want to talk to and hear from people who are putting a bunch of technologies to use solving interesting problems?

Comment Wall

Comment

RSVP for Developer Day - Boulder, CO to add comments!

Join Codetown

Attending (1)

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Spring News Roundup: Milestone Releases of Boot, Security, Auth Server, Integration, AI and AMQP

There was a flurry of activity in the Spring ecosystem during the week of February 17th, 2025, highlighting milestone releases of: Spring Boot, Spring Security, Spring Authorization Server, Spring Integration, Spring AI and Spring AMQP.

By Michael Redlich

How to Defend Amazon S3 Buckets from Ransomware Exploiting SSE-C Encryption

A new ransomware campaign, dubbed Codefinger, has been targeting Amazon S3 users by exploiting compromised AWS credentials to encrypt data using Server-Side Encryption with Customer-Provided Keys (SSE-C). Attackers then demand ransom payments for the symmetric AES-256 keys required to decrypt the data. AWS has released recommendations to help users mitigate the risk of ransomware attacks on S3.

By Renato Losio

AWS Reduces Latency and Costs for Key/Value Datastores with AZ Affinity Routing and GLIDE Valkey

AWS recently introduced Availability Zone (AZ) awareness in version 1.2 of the open source Valkey General Language Independent Driver for Enterprise (GLIDE) client library. By implementing AZ affinity routing in the open source key/value datastore, developers can reduce latency and costs by directing requests to replicas within the same AZ as the client.

By Renato Losio

Uber's Cloud Journey: Embracing ARM in an x86 World

Uber embarked on a strategic migration from on-premise data centers to Oracle Cloud Infrastructure (OCI) and Google Cloud Platform in February 2023. A key component of this migration was integrating ARM-based computers into their predominantly x86 fleet to reduce costs, improve price performance, and ensure hardware flexibility amid supply chain uncertainties.

By Claudio Masolo

Google Gemini's Long-term Memory Vulnerable to a Kind of Phishing Attack

AI security hacker Johann Rehberger described a prompt injection attack against Google Gemini able to modify its long-term memories using a technique he calls delayed tool invocation. The researcher described the attack as a sort of social engineering/phishing attack triggered by the user interacting with a malicious document.

By Sergio De Simone

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service