Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
This week's Java roundup for January 5th, 2026, features news highlighting: point releases of Gatherers4j and Keycloak; and maintenance releases of Spring gRPC, Quarkus, Grails and Java Operator SDK.
AWS has recently introduced VPC Encryption Controls, allowing customers to validate whether traffic within and between VPCs is encrypted and to require encryption where supported. The feature provides visibility into unencrypted traffic, supports enforcement using compatible Nitro-based infrastructure, and allows exclusions for resources that cannot encrypt traffic.
Claude Code's creator Boris Cherny described how he uses it at Anthropic, highlighting practices such as running parallel instances, sharing learnings, automating prompting, and rigorously verifying results to compound productivity over time.
NVIDIA has released a set of open models, datasets, and development tools covering language, agentic systems, robotics, autonomous driving, and biomedical research. The update expands several existing NVIDIA model families and makes accompanying training data and reference implementations available through GitHub, Hugging Face, and NVIDIA’s developer platforms.
MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server versions. According to the disclosure, the flaw can be exploited remotely by unauthenticated attackers with low complexity, potentially leading to the exfiltration of sensitive data and credentials.
Reply Deleted
This reply has been deleted. Return to the discussion.
Welcome to
Codetown
Sign Up
or Sign In
Or sign in with:
Happy 10th year, JCertif!
Notes
Welcome to Codetown!
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Looking for Jobs or Staff?
InfoQ Reading List
Java News Roundup: Spring gRPC, Quarkus, Gatherers4j, Keycloak, Grails, Java Operator SDK
This week's Java roundup for January 5th, 2026, features news highlighting: point releases of Gatherers4j and Keycloak; and maintenance releases of Spring gRPC, Quarkus, Grails and Java Operator SDK.
By Michael RedlichAWS Introduces VPC Encryption Controls to Enforce Encryption in Transit
AWS has recently introduced VPC Encryption Controls, allowing customers to validate whether traffic within and between VPCs is encrypted and to require encryption where supported. The feature provides visibility into unencrypted traffic, supports enforcement using compatible Nitro-based infrastructure, and allows exclusions for resources that cannot encrypt traffic.
By Renato LosioInside the Development Workflow of Claude Code's Creator
Claude Code's creator Boris Cherny described how he uses it at Anthropic, highlighting practices such as running parallel instances, sharing learnings, automating prompting, and rigorously verifying results to compound productivity over time.
By Sergio De SimoneNVIDIA Releases Open Models, Datasets, and Tools across AI, Robotics, and Autonomous Driving
NVIDIA has released a set of open models, datasets, and development tools covering language, agentic systems, robotics, autonomous driving, and biomedical research. The update expands several existing NVIDIA model families and makes accompanying training data and reference implementations available through GitHub, Hugging Face, and NVIDIA’s developer platforms.
By Robert KrzaczyńskiMongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory
MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server versions. According to the disclosure, the flaw can be exploited remotely by unauthenticated attackers with low complexity, potentially leading to the exfiltration of sensitive data and credentials.
By Renato Losio