Codetown ::: a software developer's community
CISE invites you to attend an information meeting and webinar to announce and answer questions concerning its recently released solicitation, Future Internet Architecture-Next Phase (FIA-NP: NSF 13-538) on Monday, February 11, 2013, 1:00 PM to 2:30 PM EDT. You must register at https://mmancusa.webex.com/mmancusa/j.php?ED=200243927&RG=1&... to participate.
CISE plans to support research that builds upon its current investments in Future Internet Architectures (FIA) with the Future Internet Architecture-Next Phase (FIA-NP) solicitation. Proposals are expected to specify research activities that will take existing FIA designs from basic components that have been integrated into early prototypes that demonstrate architectural principles and requirements to more sophisticated architectures with demonstrated prototype systems.
The FIA-NP information meeting will be held February 11, 2013, 1:00PM - 2:30PM EST (10:00 - 11:30 PST)
You may attend the informational meeting either on site or via live webinar.
On site: Please come to room 110 at the National Science Foundation, 4201 Wilson Blvd., Arlington, VA. No badges are needed to attend on site.
Live Webinar: Please register to attend the informational meeting via webinar using the link provided below. After your registration is accepted, you will get an email with a URL to join the meeting. Please be sure to join a few minutes before the start of the webinar. This system does not establish a voice connection on your computer; instead, your acceptance message will have a toll-free phone number that you will be prompted to call after joining. Please note that this registration is a manual process; therefore, do not expect an immediate acceptance. Acceptances should be complete by 10:00AM EST Monday 2/11. In the event the number of requests exceeds the capacity, some requests may have to be denied.
Webinar registration deadline: February 10, 2011, 23:59 PDT
Register at: https://mmancusa.webex.com/mmancusa/j.php?ED=200243927&RG=1&...
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.
By Celine Pypaert
Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.
By Eran Stiller
Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.
By Steef-Jan Wiggers
At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.
By Melvin Philips
Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.
By Craig Risi
© 2026 Created by Michael Levin.
Powered by
You need to be a member of Codetown to add comments!
Join Codetown