Codetown ::: a software developer's community
Sort by:
| Discussions | Replies | Latest Activity |
|---|---|---|
The Definitive Guide to JythonThis just in: The Definitive Guide to Jython: Python for the Java Platform is finally available! Jython is an open source implementatio… Started by Michael Levin |
0 | Aug 19, 2009 |
Programming in Scala Book is out!You may get an e-copy at a pretty low price. Check it out at http://www.artima.com/shop/programming_in_scala Have fun! -Z Started by Zemian Deng |
0 | Nov 22, 2008 |
Scala 2.7.2.final release is out!In case you missed it, the new release marks a important date for them. Besides few big features and bugs fixes added, this release will ma… Started by Zemian Deng |
0 | Nov 14, 2008 |
Using scala scripts to check Java jar filesHere I attached two scripts that might help you working with jar files. Have you tried to verify that a Class must exists in a lib directo… Started by Zemian Deng |
0 | Sep 11, 2008 |
Scala Example: a simple cat commandHi, Here is a simple Scala script that prints or concatenates text files: //file: cat.scala import java.io._ val files = args for(f <-… Started by Zemian Deng |
0 | Aug 29, 2008 |
A super rich Java String with ScalaFor the longest time I wish Java support HEREDOC kind of string construct like in Perl and other. This seems to be extremely useful when yo… Started by Zemian Deng |
0 | Aug 23, 2008 |
Sweet-0.0.1 is outI am excited to announce the first stable release of sweet. There are great samples including database access out here: http://code.google.… Started by Zemian Deng |
0 | Aug 5, 2008 |
SweetScala indeedHello everyone, I have started a Scala web framework project at http://code.google.com/p/sweetscala. It's still young, but the distributio… Started by Zemian Deng |
0 | Jul 22, 2008 |
Scala on JVM is pretty sweetI have been studying the Scala language for the last several months, and I found it very attractive. Not only it can run on JVM and use any… Started by Zemian Deng |
0 | Jul 16, 2008 |
Sample Store Catalog using using Groovy and Grails and the Java Persistence API on Glassfish with MySQLI modified this Groovy and Grails Catalog Sample application to use JPA entity java classes instead of Groovy domain classes. I followed th… Started by Carol McDonald |
0 | Jul 15, 2008 |
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.
By Celine Pypaert
Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.
By Eran Stiller
Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.
By Steef-Jan Wiggers
At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.
By Melvin Philips
Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.
By Craig Risi
© 2026 Created by Michael Levin.
Powered by