Codetown ::: a software developer's community
Hello all:It has been a few months since my last question. Had a lot of other projects taking up my time, but I am back to fighting with my Planetarium lighting controller. I have it working, but I…Continue
Started Jun 20, 2012
Hello all:I have been working on a GUI interface for controlling lights in a planetarium. I had some trouble getting the communication to happen, and received some help from this forum to get past…Continue
Started this discussion. Last reply by Jackie Gleason Feb 10, 2012.
A while ago I asked a question about using RS-232 communication with Java. It seems as though I need to abandon that route because it no longer fits the desired system requirements. Thanks to Nem…Continue
Started this discussion. Last reply by Paul Stearns Oct 5, 2011.
Hello all: I am fairly new to the Java world and would like some advice on how to handle rs-232 communications with a Java based GUI I am working on. Several years ago I created a similar GUI with…Continue
Tags: communication, rs-232, using, application, Java
Started this discussion. Last reply by Nemanja Nesic - NEM- Jun 9, 2011.
Paul Stearns has not received any gifts yet
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.
By Sergio De Simone
Introducing Claude Cowork: Anthropic's groundbreaking AI agent revolutionizing file management on macOS. With advanced automation capabilities, it enhances document processing, organizes files, and executes multi-step workflows. Users must be cautious of backup needs due to recent issues. Explore its potential for efficient office solutions while ensuring data integrity.
By Andrew Hoblitzell
Meta has revealed how it scales its Privacy-Aware Infrastructure (PAI) to support generative AI development while enforcing privacy across complex data flows. Using large-scale lineage tracking, PrivacyLib instrumentation, and runtime policy controls, the system enables consistent privacy enforcement for AI workloads like Meta AI glasses without introducing manual bottlenecks.
By Leela Kumili
Researchers at MIT's CSAIL published a design for Recursive Language Models (RLM), a technique for improving LLM performance on long-context tasks. RLMs use a programming environment to recursively decompose and process inputs, and can handle prompts up to 100x longer than base LLMs.
By Anthony Alford
Salesforce has completed a phased migration of more than 1,000 Amazon Elastic Kubernetes Service (EKS) clusters from the Kubernetes Cluster Autoscaler to Karpenter, AWS’s open-source node-provisioning and autoscaling solution.
By Craig Risi
© 2026 Created by Michael Levin.
Powered by
Comment Wall (1 comment)
You need to be a member of Codetown to add comments!
Join Codetown