Wei Teh
  • Male
Share on Facebook MySpace
  • Blog Posts
  • Discussions
  • Events
  • Groups
  • Photos
  • Photo Albums
  • Videos

Wei Teh's Friends

  • Michael Levin

Gifts Received

Gift

Wei Teh has not received any gifts yet

Give a Gift

 

Wei Teh's Page

Profile Information

How did you hear about Codetown?
Google
What are your main interests in software development?
Java ee, Android development

Comment Wall (1 comment)

You need to be a member of Codetown to add comments!

Join Codetown

At 8:17am on January 19, 2012, Michael Levin said…

Hi Wei and welcome to Codetown. All the best, Mike

 
 
 

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Talos Linux: Bringing Immutability and Security to Kubernetes Operations

Sidero Labs has been developing Talos Linux, an immutable operating system purpose-built exclusively for running Kubernetes, alongside Omni, a cluster lifecycle management platform. InfoQ met the Sidero team in Amsterdam during the TalosCon 2025 and had conversations about their approach to simplifying Kubernetes operations through minimalism and security-first design.

By Claudio Masolo

Slack Security: Inside the New Anomaly Event Response Architecture

Slack has launched Anomaly Event Response (AER), a real-time security system that autonomously detects suspicious activity, terminates risky sessions, and reduces response time from days to minutes. The system’s architecture includes a detection engine, decision framework, and response orchestrator to help organizations prevent breaches efficiently.

By Leela Kumili

Presentation: How to Always Get Invited to Big Strategic Conversations

Mark Allen discusses five key strategies for engineering leaders and architects to drive strategic impact and accelerate their careers. He explains how to identify what matters, build key cross-functional relationships, and craft an internal brand that attracts high-stakes, "green button" opportunities, culminating in a story of leading a project that saved his company €1 billion.

By Mark Allen

Podcast: Building Composable Teams: Moving Beyond Rigid Organizational Structures

In this podcast Shane Hastie, Lead Editor for Culture & Methods spoke to Luv Kapur about building composable team structures, creating trust through transparency and clarity, and enabling fluid organizational design through API-first team principles.

By Luv Kapur

Pixnapping: Side-Channel Vulnerability Allows Android Apps to Capture Sensitive Screen Data

A newly discovered class of attacks targets Android devices, allowing malicious apps to steal on-screen information from other apps using a technique known as pixel stealing. Dubbed Pixnapping, the attack leverages previously known side-channel vulnerabilities and affects virtually all apps, including Signal, Google Authenticator, Venmo, and many others.

By Sergio De Simone

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service