Codetown ::: a software developer's community
Here's an app you'll like - it's called …Continue
Tags: carey, codetown, computational, jim, translation
Started by Michael Levin Sep 25, 2012.
Jim, this is your cue! From what you've described, we're all more involved in Computational Linguistics than we think. When a call is "recorded for training purposes", when you use voice activation,…Continue
Tags: voice, activation, linguistics, white, Jim
Started by Michael Levin. Last reply by Michael Levin Nov 25, 2011.
Jim, What are some technologies (for lack of a better word) that "support" compuational linguistics. These might include algorithms, recording techniques, data lookups. There's a whole body of…Continue
Tags: voice, linguistics, computational
Started by Michael Levin Oct 25, 2011.
Jim, You described to me some shining examples of computational linguistics, such as Google Voice. What are the most active, popular examples?
Tags: voice, linguistics, computational
Started by Michael Levin Oct 25, 2011.
Comment
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The OpenTelemetry project has announced that key portions of its declarative configuration specification have reached stable status. The observability framework is a vendor-neutral and language-agnostic way to configure telemetry collection.
By Matt Saunders
Google Research unveiled TurboQuant, a novel quantization algorithm that compresses large language models’ Key-Value caches by up to 6x. With 3.5-bit compression, near-zero accuracy loss, and no retraining needed, it allows developers to run massive context windows on significantly more modest hardware than previously required. Early community benchmarks confirm significant efficiency gains.
By Bruno Couriol
Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.
By Celine Pypaert
Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.
By Eran Stiller
Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.
By Steef-Jan Wiggers
© 2026 Created by Michael Levin.
Powered by
You need to be a member of Computational Linguistics Village to add comments!