Matt Williams

Author's details

Name: Matt Williams
Date registered: August 9, 2008
URL: http://matt@matthewkwilliams.com

Biography

Matt Williams lives in Columbus, OH, in a house filled with computers, cats, books and fiber. Pursuing the goal of being a modern Renaissance person, he plays with his daughter, cooks, roasts coffee, reads, weaves, studies, and hacks, including crazy ideas like a Cloud in a Box. Docker has been an especial passion since June of 2013.

Latest posts

  1. Weaving with Light Pt. 1 — August 31, 2016
  2. Abusing HAProxy: Stupid Simple Easy Dashboards — June 24, 2016
  3. Rules for Operations — April 25, 2016
  4. DevOps Creed (Work in Progress) — April 24, 2016
  5. I am not a Mindreader: a mini-saga — April 11, 2016

Most commented posts

  1. Swarming Raspberry Pi – Part 1 — 13 comments
  2. Docker, Cgroups, Memory Constraints, and Java: A Cautionary Tale, or Here be Reapers (sometimes) — 9 comments
  3. Shrinking Docker Images — 7 comments
  4. Rails & JRuby in a Jar — 7 comments
  5. rspec, restful_authentication, and login_required — 6 comments

Author's posts listings

Oct 02

Multifarious v2

While at a DevOps Birds of a Feather session at Ohio Linux Fest today I was describing to John Willis (@botchagalupe) my experiments with Docker and the Pi Swarm. Along the way, I mentioned that I’d gotten heterogenous docker swarms working using Powerstrip — aka Multifarious, first described in Heterogenous Docker Swarms Teaser. In so …

Continue reading »

Oct 02

Looking Inside a JVM: -XX:+PrintFlagsFinal

Java’s twenty years old now — next year Duke can have Irish Coffee! Seriously, though, in that time there’s been a lot of changes to the Java Virtual Machine (JVM). What once was true may no longer be the case. In digging into an issue I discovered a nice feature of the JVM which enables …

Continue reading »

Oct 01

Sales Technique or Economic Indicator?

Recently I have been getting emails from sales people saying “I’m following up again” or “In case you didn’t see my email”. Is it a sales technique? Is it indicating that the economy is slowing? Or just people desperate to meet quotas? If the first, I find it really annoying.

Sep 30

I’m Speaking at CodeMash!

CodeMash is a conference held yearly in Sandusky, OH bringing together developers and geeks of all flavours. I’m speaking about algorithms: Great Galloping Cuckoos: Algorithms Faster than log(n): Algorithms are the foundation of Computer Science. However, over the past two decades they have, for many, taken a back seat to Design Patterns. Without strong algorithms, …

Continue reading »

Sep 30

From the vaults…. on Parentheses

To paren, or not to paren: that is the question: Whether ’tis nobler in the mind to suffer The bugs and errors of maintenance programs, Or to take arms against a host of typos, And by debugging end them? To hack: to slash; No more; and by a slash to say we end The heart-ache …

Continue reading »

Sep 25

Thoughts on Writing a Guest Post

I recently wrote a guest post for Open Source Delivers entitled Containers and Open Source Vulnerabilities. I feel very privileged to do so. Here are some initial thoughts on writing a guest post: Constraints breed Creativity — the guidelines for a blog, while constraints, can bring out the best in you. I find that having …

Continue reading »

Sep 25

Containers and Open Source Vulnerabilities

I have a guest article on BlackDuck’s OpenSource Delivers Blog — Containers and Open Source Vulnerabilities.

Sep 23

Step Away from the Computer

Step away from the computer and spend time in the “real world” looking at things around you — there are many examples of great design if you just open your eyes and look around. You will often find inspiration and solutions in the least likely place.

Sep 22

Filter All the Things!

“In the Information Age, the first step to sanity is FILTERING. Filter the information: extract for knowledge. Filter first for substance. Filter second for significance. These filters protect against advertising. Filter third for reliability. This filter protects against politicians. Filter fourth for completeness. This filter protects against the media.” — Marc Stiegler, David’s Sling I …

Continue reading »

Sep 21

F5 LTM Monitoring and Wildfly

TL;DR The F5 BigPipe LTM uses HTTP/0.9 to send its HTTP monitoring requests by default. Wildfly 9.0 does not like this; moving to a monitor request of HTTP/1.1 fixed the problem. Caution: LTM 10.2.x and 11.x do not append a CR/LF to the end unless you are using Basic Authentication. This is contrary to previous …

Continue reading »

Older posts «

» Newer posts