Codetown ::: a software developer's community
35 members
5 members
8 members
9 members
13 members
Matt Drees has not received any gifts yet
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.
By Ben Linders
AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.
By Steef-Jan Wiggers
Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.
By Kyra Mozley
In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.
By Arthur Casals
To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.
By Sergio De Simone
© 2026 Created by Michael Levin.
Powered by
Comment Wall (3 comments)
You need to be a member of Codetown to add comments!
Join Codetown
Sorry, I haven't gotten back to you in months. I meant to, but kept forgetting. Unfortunately I ended up missing half of Barcamp Tampa due to wireless issues on my netbook at home that I really really wanted to fix/figure out. Barcamp Tampa was cool. http://twitter.com/JamesTryon gave a talk on freelancing and http://twitter.com/xentek gave a really good talk on the nginx web server :)! Barcamp Orlando is April 3rd - http://www.barcamporlando.org/ check it out :). Hope things are going well with you.
It was good getting a chance to talk with you too :)