Codetown ::: a software developer's community
96 members
Latest Activity: Feb 23, 2021
Calling all Java lovers! The OrlandoJUG features leading edge presentations with you in mind. We meet every month with talks on interesting…
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.
The PyTorch Foundation recently released PyTorch version 2.5, which contains support for Intel GPUs. The release also includes several performance enhancements, such as the FlexAttention API, TorchInductor CPU backend optimizations, and a regional compilation feature which reduces compilation time. Overall, the release contains 4095 commits since PyTorch 2.4.
By Anthony AlfordUber recently detailed how it built Genie, an AI-powered on-call copilot designed to improve the efficiency of on-call support engineers. Genie leverages Retrieval-Augmented Generation (RAG) to provide accurate real-time responses and significantly enhance the speed and effectiveness of incident response. Since its launch, Genie has answered over 70,000 questions, saving 13,000 engineering hours.
By Eran StillerInternet infrastructure and security company Cloudflare has documented how it significantly upgraded its logging pipeline by moving from syslog-ng to OpenTelemetry Collector.
By Matt SaundersThis week's Java roundup for October 21st, 2024 features news highlighting: the release of Apache Pulsar 4.0; Open Liberty 24.0.0.11-beta as the first compatible implementation of the Jakarta EE 11 Core Profile; and point releases of Helidon 4.1.3, JHipster 1.21.0, and Apache Camel 4.8.1 and 4.4.4.
By Michael RedlichSecuring cell-based architecture is essential to fully capitalize on its benefits while minimizing risks. To achieve this, comprehensive security measures must be put in place. Organizations can start by isolating and containing cells using sandbox environments and strict access control mechanisms like role-based and attribute-based access control.
By Stefania Chaplin© 2024 Created by Michael Levin. Powered by