Nighthacking ...with Steven Chin and company (and featuring James Gosling)

====================

I have a virtual event to announce that you can participate in online called the NightHacking Tour.

Steven Chin is a friend and colleague of mine. He's a Java Evangelist with Oracle. Steven's taking a motorcycle tour through parts of Europe and will be interviewing some interesting people along the way.

The first stop will be with James Gosling, the original Java NightHacker.  This is a chance to watch James live and interact with him via the social stream (via UStream or by tweeting with #nighthacking) as he chats, hacks, and gives an exclusive behind-the-scenes tour of how seafaring robots are created at Liquid Robotics.

You can sign up for the event on the NightHacking UStream site here:
http://www.ustream.tv/channel/nighthacking

The stream will start at 11AM PST on Wednesday, October 24th.  [please adjust for your local time]

This is also the start of the NightHacking Europe Tour, which will include dozens of interviews/coding-sessions throughout Europe for the next 3 weeks leading up to the Devoxx conference in Antwerp Belgium.  All of this will be live streamed from different countries on a pan-European motorcycle tour.

I like motorcycles. I love Europe. Steven has arranged to interview dozens of interesting developers. And, combined with being an interesting developer himself IMHO, I believe this will be a fun and easy way to learn some new things about software development. Plus, it's going to be chilly over there on "The Continent", so you can maybe sneak in some cold weather bike touring questions and comments, too!

Here's what Steven says (and suggests)

"From 10/29 to 11/11 I will be traveling across Europe via motorcycle and doing live video streaming of the journey.  Along the way I will visit user groups, interviewing interesting folks, and hack on open source projects. The last stop will be the Devoxx conference in Belgium, which is the most influential Java conference in the world!

Join me for the journey by watching the live stream in 3 easy steps:

  1. Click “Join Crowd” on the UStream Channel Page to get notified when we are live
  2. Come back here or to the NightHacking UStream Channel to watch the free live feed
  3. Interact with me and folks I am hacking with via twitter using hashtag #nighthacking

You can also become part of the event for signing up join me in your home country as I pass through.  To sign-up, please fill out the “Let’s Meetup Form” and let me know which city you would like to meet in."

Here's Steven's itinerary. Talk about a fun trip, especially on a motorcycle where you see everything so much better:

So come join the NightHacking Tour for an exclusive hacking event with James Gosling, and follow the journey across Europe!

====================

Views: 127

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

European Initiative for Data Sovereignty Released a Trust Framework

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.

By Ben Linders

AWS Launches European Sovereign Cloud amid Questions about U.S. Legal Jurisdiction

AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.

By Steef-Jan Wiggers

Presentation: How to Unlock Insights and Enable Discovery Within Petabytes of Autonomous Driving Data

Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.

By Kyra Mozley

Article Series - AI Assisted Development: Real World Patterns, Pitfalls, and Production Readiness

In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.

By Arthur Casals

How CyberArk Protects AI Agents with Instruction Detectors and History-Aware Validation

To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.

By Sergio De Simone

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service