bill.burkecentral.com
Resteasy 3.0.9 Released | Bill the Plumber
https://bill.burkecentral.com/2014/09/17/resteasy-3-0-9-released
Software plumbing using middleware wrenches. Keycloak 1.0 Final Released. Keycloak 1.1.Beta 1 Released: SAML, Clustering, Tomcat 7. Resteasy 3.0.9 Released. September 17, 2014. I really want to thank Ron Sigal, Weinan Li, and the rest of the Resteasy community for having my back the last 5 months while I was focused on other things. Thanks for your hard work and patience. 3.0.9.Final is a maintenance release. There are a few minor migration notes. For download links, jira release notes, and documentation.
bill.burkecentral.com
sports | Bill the Plumber
https://bill.burkecentral.com/category/sports
Software plumbing using middleware wrenches. June 25, 2015. Got to see Bill DeCoste this week at DevNation and we relived some of our Superbowl memories. Here’s some pix. Ring ceremony was awhile ago, but I just love this picture. The guy has 6 bleeping rings! BTW, somebody asked me if I was at this ring ceremony…LOL! I just love this picture I found of Vince and Bill! Worst fans in the league. October 16, 2013. New England Patriots Fans Suck! Media perception vs. reality. May 17, 2008. In the NFL, and y...
bill.burkecentral.com
Keycloak 1.1.0.Beta2 Released: Adapters, Proxy, Wildfly Subsystem | Bill the Plumber
https://bill.burkecentral.com/2014/12/06/keycloak-1-1-0-beta2-released-adapters-proxy-wildfly-subsystem
Software plumbing using middleware wrenches. Keycloak 1.1.Beta 1 Released: SAML, Clustering, Tomcat 7. HTTP Quote of the day. Keycloak 1.1.0.Beta2 Released: Adapters, Proxy, Wildfly Subsystem. December 6, 2014. A lot of new features this release. Tomcat 6, 7, and 8 adapters. Jetty 8.1, 9.1, and 9.2 adapters. HTTP Security Proxy for platforms that don’t have an adapter based on Undertow. Wildfly subsystem for auth server. Allows you to run keycloak in domain mode to make it easier to run in a cluster.
bill.burkecentral.com
HTTP Quote of the day | Bill the Plumber
https://bill.burkecentral.com/2015/02/12/http-quote-of-the-day
Software plumbing using middleware wrenches. Keycloak 1.1.0.Beta2 Released: Adapters, Proxy, Wildfly Subsystem. HTTP Quote of the day. February 12, 2015. 8220;T]hose who do not understand HTTP are doomed to re-implement it on top of itself. Giles Bowkett: Why Panda Strike Wrote the Fastest JSON Schema Validator for Node.js. I wonder how many of us have done this? I know I did a few times when I first started writing REST-based services. Leave a Reply Cancel reply. Enter your comment here. Since July, 2007.
bill.burkecentral.com
jboss | Bill the Plumber
https://bill.burkecentral.com/category/jboss
Software plumbing using middleware wrenches. Keycloak 1.1.Beta 1 Released: SAML, Clustering, Tomcat 7. November 5, 2014. Copied from Stian’s announcement) Pretty big feature release:. SAML 2.0 support. Keycloak already supports OpenID Connect, but with this release we’re also introducing support for SAML 2.0. We did this by pulling in and building on top of Picketlink’s SAML libraries. Vastly improved clustering support. For a complete list of all features and fixes for this release check out JIRA. After...
resteasy.jboss.org
books - JBoss Community
http://resteasy.jboss.org/resteasy/books
Distributed Peace of Mind. RESTful Java with JAX-RS. By Bill Burke. RESTful Java with JAX-RS includes a technical guide that explains REST and JAX-RS, how they work, and when to use them. With the RESTEasy workbook that follows, you get step-by-step instructions for installing, configuring, and running several working JAX-RS examples, using the JBoss RESTEasy implementation of JAX-RS. RESTful Web Services Cookbook. Apache License, Version 2.0.
code.deepinspace.net
code@deepinspace.net: September 2013
http://code.deepinspace.net/2013_09_01_archive.html
Monday, 30 September 2013. Revoking private key access to EC2 instances, and other random tips. Consider the following scenario. You have many EC2 instances running production code. Access to those instances is using a passphrase-protected key. A member of your operations team who has access to the key leaves so you have to change the key. Or, you need to change the existing key as a matter of some internal security policy. How do you do it? Generate a new keypair. Done The old key is useless now. AWS ke...
code.deepinspace.net
code@deepinspace.net: gcc does not check out of scope names in unreachable code
http://code.deepinspace.net/2011/01/gcc-does-not-check-out-of-scope-names.html
Sunday, 30 January 2011. Gcc does not check out of scope names in unreachable code. While attempting to write a small HTTP server in C, I copied some code over from a previously written C file and immediately noticed a bug. Include "./mynet.h". If(errno = EINTR) {. Yes it's a stupid beginner mistake - typing the assignment operator instead of the equals check. The thread of execution would never enter the else block. I corrected it, but the interesting part came when I tried to compile it. I would say ye...
code.deepinspace.net
code@deepinspace.net: Dreaming in Code
http://code.deepinspace.net/2010/02/dreaming-in-code.html
Monday, 1 March 2010. I finished reading Dreaming in Code. Last week. It's Scott Rosenberg's account of a software development team's effort to build the ultimate Personal Information Manager (PIM). Led and funded by Mitch Kapor of Lotus 1-2-3 fame, the team goes through endless cycles of redesign, people issues and other upheavals. Rosenberg follows the team very closely, participating in their meetings, interviewing them and filling the narrative with his own insights. Due to numerous reasons, Chandler...
SOCIAL ENGAGEMENT