Work

Using Drush Make while ftp.drupal.org is down

The Drush Make utility downloads modules from ftp.drupal.org during the build – but the ftp.drupal.org site is currently down, which means Drush Make won’t work (and so our continuous integration has ground to a halt). There’s a fix for general Drush usage here: http://contrib.linalis.com/content/continuer-dutiliser-drush-quand-ftpdrupalorg-est-down That fix changes the download url to use drupal.org (which is …

Using Drush Make while ftp.drupal.org is down Read More »

Ubuntu and CloudInit on Amazon EC2

Alestic and Canonical have released new Ubuntu AMIs for EC2 – the EBS version in the eu-west-1 region has AMI ID “ami-38bf954c”, and the source is “099720109477/ebs/ubuntu-images/ubuntu-lucid-10.04-i386-server-20100827”. Ubuntu images support CloudInit, which runs scripts on startup to allow you to configure the server (set up ssh keys, update the repos etc). There’s a load of different …

Ubuntu and CloudInit on Amazon EC2 Read More »

Stefan Tilkov talks about REST

Old but good, this podcast  on se-radio.net with Stefan Tilkov talks around the ideas of RESTful applications – why building applications this way makes them part of the web, rather than just “on” the web, and why the REST style exploits the existing architecture of the web. There’s also a great introduction to REST ideas at http://www.infoq.com/articles/rest-introduction. I …

Stefan Tilkov talks about REST Read More »

Cultural Agoraphobia

Interesting to see that John Naugton was talking about open data and “cultural agoraphobia” in The Observer this weekend.. Talis, where I work, has just announced its Talis Connected Commons, which offers free storage of semantic data sets to anyone – as long as the data is open. Peter Murray-Rust, who is quoted in the …

Cultural Agoraphobia Read More »

Validate your inputs

Todays podcast listening for the commute was Bruce Sams talking about web app security from Software Engineering Radio. Starting with a live demo of some hacking techniques (surprisingly effective even with just the audio), it covers some of the popular attacks – SQL injection, javascript in input fields, cookie stealing, guessing adjacent ID numbers and so …

Validate your inputs Read More »