Profile cover photo
Profile photo
Paul Fremantle
217 followers
217 followers
About
Posts

Post has attachment
Languages
Inspired by #FirstSevenLanguages here is a complete list (apart from the one's I've forgotten). BASIC (ZX80/ZX81/TRS80/BBC/HP/Atari ST) Z80 / 6502 / 8086 Asm REXX APL PL/1 C  C++  C# COBOL FORTH LISP / Scheme Lotus 123 script Batch/Shell scripts (DOS, OS/2,...
Add a comment...

Post has attachment
Westerton Polkas
Westerton Polkas
tunes.fremantle.org
Add a comment...

Post has attachment
GNU Terry Pratchett on WSO2 ESB / Apache Synapse
If any of you are following the GNU Terry Pratchett discussion on Reddit, BBC or the Telegraph , then you might be wondering how to do this in the WSO2 ESB or Apache Synapse . Its very very simple. Here you go. Enjoy. Loading ....
Add a comment...

Post has attachment
WSO2 \ {Paul}
I have an announcement to make: as of this month, I am stepping down as CTO of WSO2, in order to concentrate on my research into IoT secure middleware. I have been at WSO2 since the start: our first glimmer of an idea came in August 2004 and the first solid...
Add a comment...

Post has attachment
A rose by any other name would smell as sweet, but with no name, maybe not
The famous quotation from Shakespeare is that " a rose by any other name would smell as sweet ". But what if the rose had no name. What if every time you talked about it, you had to come up with a description, you know that thing with the pretty pink petals...
Add a comment...

Post has attachment
A rose by any other name would smell as sweet, but without a name at all might not
The famous quotation from Shakespeare is that " a rose by any other name would smell as sweet ". But what if the rose had no name. What if every time you talked about it, you had to come up with a description, you know that thing with the pretty pink petals...
Add a comment...

Post has attachment
Internet of Things - protocols and access keys
I've just read this article from Mark O'Neill on the 10 concerns for the Internet of Things. Mark brings up some very interesting aspects and concerns. I'd like to comment on two of those: protocols and access keys. His primary concern is protocol prolifera...
Add a comment...

Post has attachment
CommsHack
Yesterday the University of Portsmouth Computing Society held a " Comms Hack " - basically a hackathon sponsored by Twilio. Unfortunately the Twilio guy had a problem and couldn't physically attend, but it all worked out. I could only be there for about an ...
Add a comment...

Post has attachment

Post has attachment
OAuth2 Introspection with WSO2 ESB and WSO2 Identity Server
The OAuth2 specification defines several parties: the Client, the Resource Owner, the Authorization Server and the Resource Server. Here is the (textual) diagram from the  spec : One flow that is  not  defined by the OAuth specification is any flow from the...
Add a comment...
Wait while more posts are being loaded