Codetown ::: a software developer's community
Sort by:
| Discussions | Replies | Latest Activity |
|---|---|---|
How To Compile Multiple Files Using NetBeans 6.5Hello, I'm new to Java and have been using NetBeans 6.5 as my IDE. I have been learning how to create classes and have come to the point w… Started by Mark Hollinger |
0 | Aug 12, 2009 |
Facebook connect JSThis is more javascript. However, I have been playing around with facebook connect on a website I am coding for and it is kind of a cool fe… Started by Tim Stevesi |
2 |
Jun 18, 2009 Reply by Tim Stevesi |
Courses translated to frenchI want courses of iphone's development in french. Started by Mara |
2 |
May 27, 2009 Reply by Michael Levin |
Comparing Tomcat and GlassfishThere is a direct connection between the Web container technology used by developers and the performance and agility of applications. This… Started by Carol McDonald |
0 | Mar 6, 2009 |
JavaFXhttp://weblogs.java.net/blog/caroljmcdonald/archive/2008/12/javafx_restful.html JavaFX RESTful Pet Catalog Client: a JavaFX application th… Started by Carol McDonald |
1 |
Dec 7, 2008 Reply by Michael Levin |
OJUG Mule Demo Source CodeHi All, What a great night! To those who are interested for the presentation slides and source code of my demo, you may download it here:… Started by Zemian Deng |
0 | Nov 20, 2008 |
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The team behind Google Kubernetes Engine (GKE) revealed that they successfully built and operated a Kubernetes cluster with 130,000 nodes, making it the largest publicly disclosed Kubernetes cluster to date.
By Craig Risi
Andra Lezza explains the criticality of data security for AI copilots, detailing the OWASP AI Exchange threat model and the OWASP Top 10 LLM risks. She reviews two copilot architectures - independent (single domain) and integrated (multi-tenant) - listing specific threats, controls, and best practices like granular authorization, templates, and DevSecOps to secure the entire AI data supply chain.
By Andra LezzaQCon AI New York Chair Wes Reisz talks with LinkedIn’s Karthik Ramgopal and Prince Valluri about enabling AI agents at enterprise scale. They discuss how platform teams orchestrate secure, multi-agentic systems, the role of MCP, the use of foreground and background agents, improving developer experience, and reducing toil.
By Karthik Ramgopal, Prince Valluri
The 2025 edition of re:Invent recently took place in Las Vegas. As anticipated, AI was a significant focus of the keynotes, but the community was more intrigued by announcements in the serverless space, including Lambda Managed Instances and Lambda Durable Functions. The conference marked the final keynote for Amazon CTO Werner Vogels after 14 years.
By Renato Losio
An unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC) was recently reported with the highest severity (10.0). Amazon threat intelligence teams report active exploitation attempts by multiple China state-nexus threat groups. The critical vulnerability affects React versions 19.0.0 through 19.2.0 and Next.js versions 15.x and 16.x when using App Router.
By Bruno Couriol
© 2025 Created by Michael Levin.
Powered by