Simon Maple
  • United Kingdom
Share on Facebook MySpace
  • Blog Posts (1)
  • Discussions
  • Events
  • Groups
  • Photos
  • Photo Albums
  • Videos

Simon Maple's Friends

  • Pawel Debski
  • Ed Burns
  • Michael Levin

Gifts Received

Gift

Simon Maple has not received any gifts yet

Give a Gift

 

Simon Maple's Page

Profile Information

What are your main interests in software development?
.
Do you have a website?
http://devangelist.blogspot.com

Simon Maple's Blog

vJUG: One small step for JUGs, one giant leap for JUG-kind

Posted on October 11, 2013 at 10:00am 4 Comments

What's the problem?



I love community, networking and interactions with other geeks, that's why I married one! :) The greatest thing about Java User Groups (JUGs) isn't just the great content, but also the close knit community, the beers and chatting/networking with like-minded geeks talking tech and sharing ideas. I’m an active leader of the LJC (London JUG) and speak at events as well as organiser for the LJC Open Conference (Happening this Nov 23rd ;) ). I've actually… Continue

Comment Wall (1 comment)

You need to be a member of Codetown to add comments!

Join Codetown

At 7:52am on October 11, 2013, Michael Levin said…

Hi Simon and welcome to Codetown! I think this will be a good venue for the virtual JUG. Take a look around, post some blog posts if you like and please invite some friends. All the best and good luck - we'll say in touch better now.

Michael

 
 
 

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Java News Roundup: Spring gRPC, Quarkus, Gatherers4j, Keycloak, Grails, Java Operator SDK

This week's Java roundup for January 5th, 2026, features news highlighting: point releases of Gatherers4j and Keycloak; and maintenance releases of Spring gRPC, Quarkus, Grails and Java Operator SDK.

By Michael Redlich

AWS Introduces VPC Encryption Controls to Enforce Encryption in Transit

AWS has recently introduced VPC Encryption Controls, allowing customers to validate whether traffic within and between VPCs is encrypted and to require encryption where supported. The feature provides visibility into unencrypted traffic, supports enforcement using compatible Nitro-based infrastructure, and allows exclusions for resources that cannot encrypt traffic.

By Renato Losio

Inside the Development Workflow of Claude Code's Creator

Claude Code's creator Boris Cherny described how he uses it at Anthropic, highlighting practices such as running parallel instances, sharing learnings, automating prompting, and rigorously verifying results to compound productivity over time.

By Sergio De Simone

NVIDIA Releases Open Models, Datasets, and Tools across AI, Robotics, and Autonomous Driving

NVIDIA has released a set of open models, datasets, and development tools covering language, agentic systems, robotics, autonomous driving, and biomedical research. The update expands several existing NVIDIA model families and makes accompanying training data and reference implementations available through GitHub, Hugging Face, and NVIDIA’s developer platforms.

By Robert Krzaczyński

MongoBleed Vulnerability Allows Attackers to Read Data from MongoDB's Heap Memory

MongoDB recently patched CVE-2025-14847, a vulnerability affecting multiple supported and legacy MongoDB Server versions. According to the disclosure, the flaw can be exploited remotely by unauthenticated attackers with low complexity, potentially leading to the exfiltration of sensitive data and credentials.

By Renato Losio

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service