Imagine if, for example, the hypervisors that run EC2 were compromised - imagine almost every business you deal with online compromised, all at once. This is the never-talked-about problem with the cloud - over on my timboudreau.com blog.
Case Study: Moving To The Pull Request Workflow & Integrating Quality Engineers On The Team For Better Software Quality
Save 40% on Continuous Improvement with discount code jn15ci at manning.com.
By Brian Ketelsen, Erik St. Martin, and William Kennedy
Save 40% on Java Testing with Spock with discount code jn15spock at manning.com.
The MVC JSR is progressing nicely and we have started publishing SNAPSHOT builds.
If you want to try them out grab the API JAR from https://maven.java.net/content/repositories/snapshots/javax/mvc/javax.mv... and the Implementation JAR from https://maven.java.net/content/repositories/snapshots/com/oracle/ozark/1...
Practical Probabilistic Programming: Open universe situations with unknown number of objects by Avi Pfeffer
By Avi Pfeffer
We consider client devices (e.g. Android) connecting to a Java server for secure networking. Say we have stringent authentication requirements, and so decide to use client-authenticated SSL sockets, using self-signed client certificates.