Codetown ::: a software developer's community
I have a virtual event to announce that you can participate in online called the NightHacking Tour.
Steven Chin is a friend and colleague of mine. He's a Java…
ContinueAdded by Michael Levin on October 23, 2012 at 6:00am — No Comments
Got CDI? Wonder what dependency injection and JEE6 are all about? What the heck is Spring? RSVP, por favor. This is an event you won't want to miss! Check it out here and please RSVP so we'll know how much pizza to order. Invite your…
Added by Michael Levin on October 16, 2012 at 8:11am — 1 Comment
A good time was had by all at our October GatorJUG meeting. Kevin Neelands discussed Android Design Patterns in the context of his recent work on the job with an Android app. The lessons learned he presented were not just interesting but huge timesavers for him. They also dramatically…
Added by Michael Levin on October 15, 2012 at 7:00am — No Comments
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.
By Celine Pypaert
Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.
By Eran Stiller
Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.
By Steef-Jan Wiggers
At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.
By Melvin Philips
Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.
By Craig Risi
© 2026 Created by Michael Levin.
Powered by