Event Details

OrlandoJUG

Time: June 24, 2010 from 6pm to 9pm
Location: DeVry University
Street: 4000 Millennia Blvd room 106 106 106
City/Town: Orlando
Website or Map: http://www.orl.devry.edu/camp…
Phone: Skype ::: mlevin77
Event Type: meeting
Organized By: Michael Levin
Latest Activity: Jun 25, 2010

Export to Outlook or iCal (.ics)

Event Description

From IDE to Data Center - What Every Developer Should Know About Deploying Distributed Systems to Production

Taking a distributed system from development into a working production environment is a challenge that many developers take for granted. This talk will explore these challenges, especially scenarios that are not typically seen in a development setting.

Comment Wall

Comment

RSVP for OrlandoJUG to add comments!

Join Codetown

Comment by Michael Levin on June 25, 2010 at 7:41am
Thanks, Patrick! I know the community appreciated your presentations. You're welcome back anytime. I'd love it if someone would write up a summary...
Comment by Patrick Peralta on June 24, 2010 at 10:37pm
Attached are slides to IDE to Data Centerf
Comment by Patrick Peralta on May 17, 2010 at 8:34pm
We will also be giving away a copy of the recently released Coherence Book!

Attending (12)

Might attend (2)

Not Attending (2)

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Anthropic Introduces MCP Tunnels for Private Agent Access to Internal Systems

Anthropic has expanded its Claude Managed Agents platform with two enterprise-focused capabilities: self-hosted sandboxes and MCP tunnels. The release aims to address a recurring challenge in enterprise AI deployments, where organizations want to use autonomous agents but cannot allow execution environments or internal systems to leave their security perimeter.

By Robert Krzaczyński

Agoda Builds Multimodal Content System to Bridge Images and Reviews in Travel Discovery

Agoda Multimodal Content Systemhttps://example.com/agoda-multimodal-content-systemAgoda unifies hotel images and guest reviews using a shared topic taxonomy, enabling multimodal retrieval across 700M+ images and multilingual reviews with offline enrichment and low-latency serving.

By Leela Kumili

Presentation: Powering the Future: Building Your GenAI Infrastructure Stack

Merrin Kurian shares the architectural blueprints and organizational processes behind Intuit’s AI transformation. She explains the "fixed, flexible, free" framework used to scale GenOS across 8,000 developers, enabling 3,500+ production experiments. She discusses critical agent failure modes, the "LLM-as-a-judge" evaluation strategy, and how to build "tool-ready" APIs for the future.

By Merrin Kurian

TanStack Details Sophisticated npm Supply Chain Attack That Compromised 42 Packages

TanStack has released a detailed postmortem describing a sophisticated supply-chain attack that compromised 42 npm packages and published 84 malicious package versions in just six minutes, exposing developers and CI/CD systems to credential theft and malware propagation.

By Craig Risi

Article: Kernel-Level Ground Truth: Why eBPF is Replacing User-Space Agents for Security Observability

eBPF is emerging as a preferred method for security observability over traditional user-space agents. By attaching probes directly to the Linux kernel's syscall interface, it provides consistent visibility even during container-level compromises. eBPF reduces security-related CPU consumption and limits data volume by performing filtering at the kernel level, enhancing operational efficiency.

By Niranjan Sharma

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service