Codetown ::: a software developer's community
Ismail Jones has not received any gifts yet
Posted on September 17, 2019 at 11:09pm 0 Comments 0 Likes
Posted on May 15, 2017 at 8:36pm 0 Comments 0 Likes
First of all, relax, I'm not announcing an exclusive executive swapmeet. The market for used cell phones has ramped up to a whopping $11 billion as of 2016[1]. That's a big number by itself, especially since the market scarcely existed just ten years ago. By comparison, everything sold in every category by everyone worldwide on Ebay, new or used, was $84 billion total in 2016[2].
Unless you are actually a senior exec and can offer your device, refurbished, to other…
ContinuePosted on May 14, 2017 at 9:24am 0 Comments 0 Likes
Mobile devices prove to be a setback for cross-platform software development, but I hope it will be a minor one. At present, Android totally dominates the mobile market both in terms of hardware and software volume. As well, mobile devices are overtaking desktops for overall usage as we speak. But Linux, as open-source-friendly as it is appears to be getting the rub from Google, so where are we?
As Google continues to grumble about not controlling the world, they're leaking…
Continue
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The team behind Google Kubernetes Engine (GKE) revealed that they successfully built and operated a Kubernetes cluster with 130,000 nodes, making it the largest publicly disclosed Kubernetes cluster to date.
By Craig Risi
Andra Lezza explains the criticality of data security for AI copilots, detailing the OWASP AI Exchange threat model and the OWASP Top 10 LLM risks. She reviews two copilot architectures - independent (single domain) and integrated (multi-tenant) - listing specific threats, controls, and best practices like granular authorization, templates, and DevSecOps to secure the entire AI data supply chain.
By Andra LezzaQCon AI New York Chair Wes Reisz talks with LinkedIn’s Karthik Ramgopal and Prince Valluri about enabling AI agents at enterprise scale. They discuss how platform teams orchestrate secure, multi-agentic systems, the role of MCP, the use of foreground and background agents, improving developer experience, and reducing toil.
By Karthik Ramgopal, Prince Valluri
The 2025 edition of re:Invent recently took place in Las Vegas. As anticipated, AI was a significant focus of the keynotes, but the community was more intrigued by announcements in the serverless space, including Lambda Managed Instances and Lambda Durable Functions. The conference marked the final keynote for Amazon CTO Werner Vogels after 14 years.
By Renato Losio
An unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC) was recently reported with the highest severity (10.0). Amazon threat intelligence teams report active exploitation attempts by multiple China state-nexus threat groups. The critical vulnerability affects React versions 19.0.0 through 19.2.0 and Next.js versions 15.x and 16.x when using App Router.
By Bruno Couriol
© 2025 Created by Michael Levin.
Powered by
Comment Wall (2 comments)
You need to be a member of Codetown to add comments!
Join Codetown