Efren Katague
  • Male
Share on Facebook MySpace
  • Blog Posts
  • Discussions
  • Events
  • Groups (1)
  • Photos
  • Photo Albums
  • Videos

Efren Katague's Friends

  • Michael Levin

Efren Katague's Groups

Gifts Received

Gift

Efren Katague has not received any gifts yet

Give a Gift

 

Efren Katague's Page

Profile Information

How did you hear about Codetown?
Search about Grails
What are your main interests in software development?
Grails, Groovy and Java
Do you have a website?
http://home.people.net.au/~kcs

Comment Wall (1 comment)

You need to be a member of Codetown to add comments!

Join Codetown

At 8:51am on March 19, 2010, Michael Levin said…
Hi Efren, and welcome to Codetown. You'll enjoy it here, I'm sure. There are several other Australian members, Behrang is one. We've just had a Grails meeting at the GatorJUG (Town) and an upcoming one at OrlandoJUG. There will be one at the TampaJUG, as well! So, I hope you look around and find the archive of Josh's Grails presentation - here you go: http://www.codetown.us/profiles/blogs/recap-gatorjug-grails-talk

Please invite lots of your friends and help build Codetown into a big community. By the way, I like your website.

All the best,

Michael
 
 
 

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

European Initiative for Data Sovereignty Released a Trust Framework

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.

By Ben Linders

AWS Launches European Sovereign Cloud Amid Questions About U.S. Legal Jurisdiction

AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.

By Steef-Jan Wiggers

Presentation: How to Unlock Insights and Enable Discovery Within Petabytes of Autonomous Driving Data

Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.

By Kyra Mozley

Article Series - AI Assisted Development: Real World Patterns, Pitfalls, and Production Readiness

In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.

By Arthur Casals

How CyberArk Protects AI Agents with Instruction Detectors and History-Aware Validation

To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.

By Sergio De Simone

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service