Kait O'Neal's Likes

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Comprehensive Approaches to Software Supply Chain Security

Mykhailo Brodskyi discusses critical software supply chain security risk categories relevant to FinTech and explains effective mitigation strategies. Drawing from real project case studies, he shares insights to protect systems from vulnerabilities and ensure platform security and resilience. Demo: third-party library risk mitigation through software bill of materials generation and analysis.

By Mykhailo Brodskyi

Article: Shadow Table Strategy for Seamless Service Extractions and Data Migrations

The shadow table strategy creates a synchronized duplicate of the data that keeps the production system fully operational during changes, enabling zero-downtime migrations. The approach supports diverse scenarios - including database migrations, microservices extractions, and incremental schema refactoring - that update live systems safely and progressively.

By Apoorv Mittal

Optimize AI Workloads: Google Cloud’s Tips and Tricks

Google Cloud has announced a suite of new tools and features designed to help organizations reduce costs and improve efficiency of AI workloads across their cloud infrastructure. The announcement comes as enterprises increasingly seek ways to optimize spending on AI initiatives while maintaining performance and scalability.

By Claudio Masolo

QCon London: A Three-Step Blueprint for Managing Open Source Risk

At QCon London 2025, Johnson Matthey's Vulnerability Manager, Celine Pypaert, discussed managing open-source dependency risks while maintaining momentum in innovation. She described a three-part blueprint for handling the security challenges that arise with the now widespread use of open-source dependencies.

By Matt Saunders

Kafka 4.0: KRaft Simplifies Architecture

Apache Kafka 4.0 ushers in a transformative era by adopting KRaft mode, eliminating the need for ZooKeeper, streamlining architecture, and enhancing scalability. With a next-gen consumer group protocol for improved performance and early access to point-to-point messaging, Kafka solidifies its role in modern data streaming. Elevate your data infrastructure with Kafka’s innovative advancements!

By Steef-Jan Wiggers

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service