May 2017 Blog Posts (4)

Add a Caption to an Image

The ability to Interpret image data using software is advancing fast! The two images above are captioned with program generated text. Here's an article that describes concepts and an approach to generate a caption for an image. The code is written in Python and uses TensorFlow. …

Continue

Added by Michael Levin on May 25, 2017 at 8:57am — No Comments

The JHipster Mini Book ::: Free!

This is what I'm reading right now. Here you go! Matt has given us good presentations that are quick and to the point. Super cool! If you decide to pay $19.95 for the printed book, it'll cover about 3 craft pints. The health monitor app Matt made will record one less point. You'll see! Enjoy, and be sure to let Matt know how much you appreciate this free mini…

Continue

Added by Michael Levin on May 18, 2017 at 2:30pm — No Comments

$11 Billion Swapmeet

First of all, relax, I'm not announcing an exclusive executive swapmeet.  The market for used cell phones has ramped up to a whopping $11 billion as of 2016[1].  That's a big number by itself, especially since the market scarcely existed just ten years ago.  By comparison, everything sold in every category by everyone worldwide on Ebay, new or used, was $84 billion total in 2016[2].

Unless you are actually a senior exec and can offer your device, refurbished, to other…

Continue

Added by Ismail Jones on May 15, 2017 at 8:36pm — No Comments

Cross-Platform Mobile Development

Mobile devices prove to be a setback for cross-platform software development, but I hope it will be a minor one.  At present, Android totally dominates the mobile market both in terms of hardware and software volume.  As well, mobile devices are overtaking desktops for overall usage as we speak.  But Linux, as open-source-friendly as it is appears to be getting the rub from Google, so where are we?

As Google continues to grumble about not controlling the world, they're leaking…

Continue

Added by Ismail Jones on May 14, 2017 at 9:24am — No Comments

Monthly Archives

2025

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.

By Celine Pypaert

Zendesk Says AI Makes Code Abundant, Shifting the Bottleneck to “Absorption Capacity”

Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.

By Eran Stiller

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

New Rowhammer Attacks on NVIDIA GPUs Enable Full System Takeover

Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.

By Craig Risi

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service