Event Details

GatorJug - Jython

Time: October 12, 2016 from 6pm to 8pm
Location: TBA
Website or Map: http://www.gatorjug.org
Phone: 321-252-9322
Event Type: meeting
Organized By: Michael Levin
Latest Activity: Jan 19, 2016

Export to Outlook or iCal (.ics)

Event Description

Stay tuned as plans firm up...Jim Baker, Jython guy is hoping to join us in the Fall. What's Jython? It's Python on the Java Virtual Machine (JVM). Jim's the Jython guru. He's given great talks in the past here at GatorJug. Many of you know him. Jim is a practicing software developer, currently with Rackspace and formerly with Canonical. He's also a prof at Univ of Colorado. You can reach him right here at Codetown.

We normally meet on the 2nd Wed, but the date may adjust so Jim can also give a talk for the OrlandoJug.

Comment Wall

Comment

RSVP for GatorJug - Jython to add comments!

Join Codetown

Attending (1)

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Google Cloud Demonstrates Massive Kubernetes Scale with 130,000-Node GKE Cluster

The team behind Google Kubernetes Engine (GKE) revealed that they successfully built and operated a Kubernetes cluster with 130,000 nodes, making it the largest publicly disclosed Kubernetes cluster to date.

By Craig Risi

Presentation: Securing AI Assistants: Strategies and Practices for Protecting Data

Andra Lezza explains the criticality of data security for AI copilots, detailing the OWASP AI Exchange threat model and the OWASP Top 10 LLM risks. She reviews two copilot architectures - independent (single domain) and integrated (multi-tenant) - listing specific threats, controls, and best practices like granular authorization, templates, and DevSecOps to secure the entire AI data supply chain.

By Andra Lezza

Podcast: Platform Engineering for AI: Scaling Agents and MCP at LinkedIn

QCon AI New York Chair Wes Reisz talks with LinkedIn’s Karthik Ramgopal and Prince Valluri about enabling AI agents at enterprise scale. They discuss how platform teams orchestrate secure, multi-agentic systems, the role of MCP, the use of foreground and background agents, improving developer experience, and reducing toil.

By Karthik Ramgopal, Prince Valluri

Durable Functions and Werner Vogels’ Last Keynote: Highlights of AWS re:Invent 2025

The 2025 edition of re:Invent recently took place in Las Vegas. As anticipated, AI was a significant focus of the keynotes, but the community was more intrigued by announcements in the serverless space, including Lambda Managed Instances and Lambda Durable Functions. The conference marked the final keynote for Amazon CTO Werner Vogels after 14 years.

By Renato Losio

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

An unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC) was recently reported with the highest severity (10.0). Amazon threat intelligence teams report active exploitation attempts by multiple China state-nexus threat groups. The critical vulnerability affects React versions 19.0.0 through 19.2.0 and Next.js versions 15.x and 16.x when using App Router.

By Bruno Couriol

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service