On The Theory of Possibility


If you are a member of an open source community and have been developing, designing and maintaining open source code for some time, it is very likely that from time to time you may encounter requests, comments and questions such as this:

We are starting with our deployment of [insert-name]. One of our major requirements is that once the user logs into the application, a request via our own very special protocol is submitted to his/her automobile to schedule a job with the vehicle’s IOT system to start up the A/C in 8 hours. When the user finishes work in a typical 8-hour work day, he/she can very comfortably get back into the car that is prepped with an exact and very personalized degree of temperature for all seasons. We’d also like the timespan to be configurable. Oh, we also use Active Directory.

So far, very cool. Exciting, rather. I wonder if we could also automatically submit an order to Pizza Hut to deliver a large Hawaiian pizza to the user’s residence. That would be sweet.

The post follows:

Is it possible?

If not, are there plans to support this?

I don’t know about you, dear reader, but I posit that there is virtually nothing in life that is impossible. My half serious reaction, in my head, usually is something along the lines of the following:

Dear [insert-name],

All things are possible in open source.

4000 hours.

Regards,

Some things, however, are improbable [1].

Misagh Moayyed

[1]There is no such thing as a ‘plan’. Just a pending pull request.

Related Posts

CAS 5.1.0 RC3 Feature Release

...in which I present an overview of CAS 5.1.0 RC3 release.

CAS 5.0.x Deployment - WAR Overlays

Learn how to configure and build your own CAS deployment via the WAR overlay method, get rich quickly, stay healthy indefinitely and respect family and friends in a few very easy steps.

CAS 5 LDAP AuthN and Jasypt Configuration

Learn how to configure LDAP AuthN with CAS and secure LDAP credentials via Jasypt.

CAS 5 SAML2 Delegated AuthN Tutorial

Learn how to delegate authentication requests to external SAML2 identity providers.

Busting the Myth - GA Release

Musings on the trustworthiness of a general availability (GA) release and its production-readiness calibre in open source.

CAS Vulnerability Disclosure

Disclosure of a security issue with the CAS administrative endpoints exposure.

CAS 5.1.0 RC2 Feature Release

...in which I present an overview of CAS 5.1.0 RC2 release.

CAS 5 Database Authentication Tutorial

Learn how to configure database authentication in CAS 5.

Intro To CAS Auto Configuration Strategy

A short and painless introduction into how CAS uses Spring Boot to tickle the runtime conditionally.

Design CAS-Enabled Custom Protocols

Learn how to design and mass-promote your very own custom authentication protocol, get rich quickly, stay healthy indefinitely and reach a new state of enlightenment in a few very easy steps.