-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Peter,
On 2/17/2009 5:08 AM, Peter Crowther wrote:
>> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
>> IMHO, you either have control of your production environment
>> yourself (and can do whatever you want) or you have an ops team
>
> From: Ken Bowen [mailto:kbo...@als.com]
> The only thing more fiery than "language X is better than language Y"
> is "editor Z is better than editor W" :-)
To skip a few levels in the inevitable impending debate...
"Well I edited the inodes by hand. With magnets."
(http://www.userfriendly.o
The only thing more fiery than "language X is better than language Y"
is "editor Z is better than editor W" :-)
On Feb 17, 2009, at 9:45 AM, André Warnier wrote:
"language X is better than language Y"
-
To unsubscribe, e-
Just in case it was missed in the subsequent conflagration (and I always
marvel at how easy it is to start a conflagration by saying something
like "language X is better than language Y"), I would just like to state
that my blurb was meant to be taken lightly, with ;-) and so on.
Comparing pro
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> IMHO, you either
> have control of your production environment yourself (and can do
> whatever you want) or you have an ops team with complete
> control of your
> production environment (and they ought to be able to handle
> scary
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Subject: Re: [OT] of the different methods to get a user-id
> Do you mean gcc on win32 worked as you expected?
Yes, it produced the same results as Java.
- Chuck
THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Chuck,
On 2/16/2009 5:19 PM, Caldarale, Charles R wrote:
>> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
>> Subject: Re: [OT] of the different methods to get a user-id
>>
>> For instance.
>> i = i++
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Subject: Re: [OT] of the different methods to get a user-id
>
> For instance.
> i = i++
>
> yields different results depending on what language
> you are using. C and Java produce different outputs
>
Chris,
I offer my opinions here as a real "grey beard" (literally). I certainly
agree with you that people should have
a breath of skills allowing them to use the right tool at the right time.
However, notwithstanding the fact that the other day I worked out that I
have actually used about 15
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
André,
What the hell.. let's start a holy war?!
On 2/13/2009 10:25 AM, André Warnier wrote:
> Their merit is all the greater since
> they work in the obscure non-graphical background, they never get any of
> the attention, and they have to share mach
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Chuck,
On 2/12/2009 10:27 PM, Caldarale, Charles R wrote:
>> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
>> Subject: Re: [OT] of the different methods to get a user-id
>>
>> I don't understand that,
Peter Crowther wrote:
From: Caldarale, Charles R [mailto:chuck.caldar...@unisys.com]
Hear, hear! In a past life, a guy I know actually wrote a
suite of production programs in APL - which was even more
cryptic (but also more logical) than Perl.
Dedication indeed! Did he need the custom golfbal
> From: Caldarale, Charles R [mailto:chuck.caldar...@unisys.com]
> Hear, hear! In a past life, a guy I know actually wrote a
> suite of production programs in APL - which was even more
> cryptic (but also more logical) than Perl.
Dedication indeed! Did he need the custom golfball for the teletyp
> From: Peter Crowther [mailto:peter.crowt...@melandra.com]
> Subject: RE: [OT] of the different methods to get a user-id
>
> Thank you. Although I don't need any further reasons to
> avoid that camel of a language whenever I can, it's always
> nice to find another re
> From: André Warnier [mailto:a...@ice-sa.com]
> I was going to let that one pass, but now I'm provoked.
> The expressions above do work differently in Perl.
[...]
> However, the calle sub can be cleverer and anticipate this, by doing :
> return wantarray ? (i++) : i++;
> thus checking in which con
Caldarale, Charles R wrote:
From: Christopher Schultz [mailto:ch...@christopherschultz.net]
Subject: Re: [OT] of the different methods to get a user-id
I don't understand that, either. I suppose this works differently in
different languages, though:
return i++;
return (i++);
Not any
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Subject: Re: [OT] of the different methods to get a user-id
>
> I don't understand that, either. I suppose this works differently in
> different languages, though:
>
> return i++;
>
> return (i++);
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Chuck,
On 2/12/2009 1:22 PM, Caldarale, Charles R wrote:
>
> As Pid surmised, it's not Tomcat that is giving you different
> answers.
> Here's Tomcat's implementation of HttpServletRequest.getRemoteUser():
>
> public String getRemoteUser() {
>
> From: André Warnier [mailto:a...@ice-sa.com]
> Subject: Re: of the different methods to get a user-id
>
> > I would expect
> > request.getRemoteUser() == request.getUserPrincipal().getName()
> > But there no literature which says that must be so.
>
> And the rea
André Warnier wrote:
> Tim Funk wrote:
>> Personally -
>>
>> I would expect
>> request.getRemoteUser() == request.getUserPrincipal().getName()
>>
>> But there no literature which says that must be so.
>
> And the reality shows it isn't.
> So somehow there must be two distinct underlying "thingies
Tim Funk wrote:
Personally -
I would expect
request.getRemoteUser() == request.getUserPrincipal().getName()
But there no literature which says that must be so.
And the reality shows it isn't.
So somehow there must be two distinct underlying "thingies" in Tomcat
where the two different answe
Personally -
I would expect
request.getRemoteUser() == request.getUserPrincipal().getName()
But there no literature which says that must be so. So in that absence
of that - you'll probably need a RemoteUserHackFilter to unify the
various behaviors and then you standardize on one model and
Rem
Hi.
I am currently testing/comparing two user authentication methods for
webapps, in a Windows NTLM context.
Despite my abysmal lack of knowledge in matters Java and Tomcat, I
notice a difference between the two, and I would like to ask here if it
matters, and if yes how.
Both authentication m
23 matches
Mail list logo