Codetown ::: a software developer's community
Time: October 12, 2016 from 6pm to 8pm
Location: TBA
Website or Map: http://www.gatorjug.org
Phone: 321-252-9322
Event Type: meeting
Organized By: Michael Levin
Latest Activity: Jan 19, 2016
Stay tuned as plans firm up...Jim Baker, Jython guy is hoping to join us in the Fall. What's Jython? It's Python on the Java Virtual Machine (JVM). Jim's the Jython guru. He's given great talks in the past here at GatorJug. Many of you know him. Jim is a practicing software developer, currently with Rackspace and formerly with Canonical. He's also a prof at Univ of Colorado. You can reach him right here at Codetown.
We normally meet on the 2nd Wed, but the date may adjust so Jim can also give a talk for the OrlandoJug.
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.
By Ben Linders
AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.
By Steef-Jan Wiggers
Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.
By Kyra Mozley
In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.
By Arthur Casals
To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.
By Sergio De Simone
© 2026 Created by Michael Levin.
Powered by
RSVP for GatorJug - Jython to add comments!
Join Codetown