August 2010 Blog Posts (6)

Notes from JCertif, in Brazzaville, Republic of Congo

Brazzaville, Republic of Congo





I've blogged a lot about this place and why I am here, so I'll summarize (read www.facebook.com/mikelevin

http://jroller.com/Sandymountster ;

http://www.codetown.us/ and…

Continue

Added by Michael Levin on August 28, 2010 at 9:30am — No Comments

JCertif is on! Rockin' in the Congo...



JCertif is one of the first Java related conferences in the Republic of Congo, Brazzaville. Sponsored by AfricaJUG, CongoJUG, Oracle and Fujitsu and organized by none other than Codetown's own… Continue

Added by Michael Levin on August 25, 2010 at 6:47am — No Comments

How to make database driven i18n using spring

Had to do this for an Abercrombie and thought I would share. Cool stuff!

It is a rough draft and I am having trouble getting my autowired working but I am sure this is just a config issue I need to work out. Feedback is appriciated!

Jackie

Added by Jackie Gleason on August 17, 2010 at 8:17pm — No Comments

DevCamp Bangalore

We're happy to announce the third edition of DevCamp Bangalore -

DevCamp Bangalore 3 (http://bangalore.devcamp.in) on Saturday, 4th

September 2010.



The event will be sponsored & hosted by ThoughtWorks

(www.thoughtworks.com) at our office in Diamond District, Bangalore.

(view map:… Continue

Added by Michael Levin on August 16, 2010 at 7:29am — No Comments

eWaste and the Social Landfill



Murray's concern with the problems presented by unwanted but usable old computers being discarded in landfills led him to an unexpected solution. He talks to TEDxCreativeCoast 2010 about the problems of e-waste, the digital divide, and how a local youth organization is tackling a small part of the problem by giving back to those most in…

Added by Michael Levin on August 15, 2010 at 11:00am — No Comments

Lady Java

Added by Michael Levin on August 13, 2010 at 10:20pm — No Comments

Monthly Archives

2025

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.

By Celine Pypaert

Zendesk Says AI Makes Code Abundant, Shifting the Bottleneck to “Absorption Capacity”

Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.

By Eran Stiller

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

New Rowhammer Attacks on NVIDIA GPUs Enable Full System Takeover

Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.

By Craig Risi

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service