{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Chris Poole","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/chrispoole","_microblog":{"about":"https://micro.blog/about/api","id":"7493","username":"chrispoole","bio":"Principal Engineer, DevRel @Fastly | Prior: @IBM, Theoretical Physics PhD | Interested in developer education, edge computing, science, security | Views my own","pronouns":"","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://avatars.micro.blog/avatars/2022/7493.jpg"},"items":[{"id":"14745119","content_html":"<p>Playing with Microblogs: <a href=\"https://chrispoole.com/article/2022/11/21/playing-with-microblogs\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2022/11/21/playing-with-microblogs","date_published":"2022-11-21T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2022-11-21 00:00","date_timestamp":1668988800,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"6624652","content_html":"<p>Code Pattern: Disaster Donations Website: <a href=\"https://chrispoole.com/article/code-pattern-disaster-donations-website\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/code-pattern-disaster-donations-website","date_published":"2019-11-15T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2019-11-15 00:00","date_timestamp":1573776000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201415","content_html":"<p>Code Pattern: Disaster Donations Website: <a href=\"https://chrispoole.com/article/2019/11/15/code-pattern-disaster-donations-website\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2019/11/15/code-pattern-disaster-donations-website","date_published":"2019-11-15T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2019-11-15 00:00","date_timestamp":1573776000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5540344","content_html":"<p>Use IBM Cloud Hyper Protect Crypto Services to Encrypt VMware Disks: <a href=\"https://chrispoole.com/article/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks","date_published":"2019-08-01T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2019-08-01 23:00","date_timestamp":1564700400,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201414","content_html":"<p>Use IBM Cloud Hyper Protect Crypto Services to Encrypt VMware Disks: <a href=\"https://chrispoole.com/article/2019/08/02/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2019/08/02/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks","date_published":"2019-08-01T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2019-08-01 23:00","date_timestamp":1564700400,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446818","content_html":"<p>Create a Secure Mobile Application Where All Data Is Encrypted in Flight, at Rest, and in Use: <a href=\"https://chrispoole.com/article/create-a-secure-mobile-application\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/create-a-secure-mobile-application","date_published":"2018-12-13T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-12-13 00:00","date_timestamp":1544659200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446817","content_html":"<p>Create a Secure Server-Side Application Where All Data Is Encrypted in Flight, at Rest, and in Use: <a href=\"https://chrispoole.com/article/create-a-secure-server-side-application\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/create-a-secure-server-side-application","date_published":"2018-12-13T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-12-13 00:00","date_timestamp":1544659200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201413","content_html":"<p>Create a Secure Mobile Application Where All Data Is Encrypted in Flight, at Rest, and in Use: <a href=\"https://chrispoole.com/article/2018/12/13/create-a-secure-mobile-application\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2018/12/13/create-a-secure-mobile-application","date_published":"2018-12-13T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-12-13 00:00","date_timestamp":1544659200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201412","content_html":"<p>Create a Secure Server-Side Application Where All Data Is Encrypted in Flight, at Rest, and in Use: <a href=\"https://chrispoole.com/article/2018/12/13/create-a-secure-server-side-application\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2018/12/13/create-a-secure-server-side-application","date_published":"2018-12-13T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-12-13 00:00","date_timestamp":1544659200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5457306","content_html":"<p>Ensuring Your Customers’ Data Privacy With Applications Secured on IBM Z: <a href=\"https://chrispoole.com/article/securing-applications-on-ibm-z\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/securing-applications-on-ibm-z","date_published":"2018-10-24T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-10-24 23:00","date_timestamp":1540422000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201411","content_html":"<p>Ensuring Your Customers’ Data Privacy With Applications Secured on IBM Z: <a href=\"https://chrispoole.com/article/2018/10/25/securing-applications-on-ibm-z\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2018/10/25/securing-applications-on-ibm-z","date_published":"2018-10-24T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-10-24 23:00","date_timestamp":1540422000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446816","content_html":"<p>Podcast on CICS: Terminal Talk: <a href=\"https://chrispoole.com/article/terminal-talk-cics\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/terminal-talk-cics","date_published":"2018-09-16T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-09-16 23:00","date_timestamp":1537138800,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201410","content_html":"<p>Podcast on CICS: Terminal Talk: <a href=\"https://chrispoole.com/article/2018/09/17/terminal-talk-cics\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2018/09/17/terminal-talk-cics","date_published":"2018-09-16T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-09-16 23:00","date_timestamp":1537138800,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446815","content_html":"<p>Integrating Systems of Record Applications With IBM Blockchain: <a href=\"https://chrispoole.com/article/blockchain-and-sor-applications\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/blockchain-and-sor-applications","date_published":"2018-02-27T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-02-27 00:00","date_timestamp":1519689600,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201409","content_html":"<p>Integrating Systems of Record Applications With IBM Blockchain: <a href=\"https://chrispoole.com/article/2018/02/27/blockchain-and-sor-applications\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2018/02/27/blockchain-and-sor-applications","date_published":"2018-02-27T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2018-02-27 00:00","date_timestamp":1519689600,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446814","content_html":"<p>IBM CICS Asynchronous API: Concurrent Processing Made Simple: <a href=\"https://chrispoole.com/article/cics-async-api-redbooks\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/cics-async-api-redbooks","date_published":"2017-12-22T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-12-22 00:00","date_timestamp":1513900800,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201408","content_html":"<p>IBM CICS Asynchronous API: Concurrent Processing Made Simple: <a href=\"https://chrispoole.com/article/2017/12/22/cics-async-api-redbooks\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2017/12/22/cics-async-api-redbooks","date_published":"2017-12-22T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-12-22 00:00","date_timestamp":1513900800,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446813","content_html":"<p>Scripting with z/OS Provisioning Toolkit: Removing Old Containers: <a href=\"https://chrispoole.com/article/removing-old-containers\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/removing-old-containers","date_published":"2017-07-20T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-07-20 23:00","date_timestamp":1500591600,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201407","content_html":"<p>Scripting with z/OS Provisioning Toolkit: Removing Old Containers: <a href=\"https://chrispoole.com/article/2017/07/21/removing-old-containers\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2017/07/21/removing-old-containers","date_published":"2017-07-20T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-07-20 23:00","date_timestamp":1500591600,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446812","content_html":"<p>IBM CICS Asynchronous API Allows for More Natural Program Creation: <a href=\"https://chrispoole.com/article/cics-async-article\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/cics-async-article","date_published":"2017-04-30T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-04-30 23:00","date_timestamp":1493593200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11201406","content_html":"<p>IBM CICS Asynchronous API Allows for More Natural Program Creation: <a href=\"https://chrispoole.com/article/2017/05/01/cics-async-article\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/2017/05/01/cics-async-article","date_published":"2017-04-30T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-04-30 23:00","date_timestamp":1493593200,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446811","content_html":"<p>Using Microservices on z Systems With CICS Improves Flexibility and Reliability: <a href=\"https://chrispoole.com/article/microservices-on-z\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/microservices-on-z","date_published":"2017-03-01T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-03-01 00:00","date_timestamp":1488326400,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446810","content_html":"<p>IBM Systems Master Inventors Driving Innovation for 2017: <a href=\"https://chrispoole.com/article/master-inventors\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/master-inventors","date_published":"2017-01-19T00:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2017-01-19 00:00","date_timestamp":1484784000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"5446809","content_html":"<p>Podcast: CICS TS V5.4 open beta – CICS microservices: <a href=\"https://chrispoole.com/article/podcast-cics-microservices\">chrispoole.com</a></p>","summary":"","url":"https://chrispoole.com/article/podcast-cics-microservices","date_published":"2016-10-04T23:00:00+00:00","author":{"name":"Chris Poole","url":"https://chrispoole.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2022%2F7493.jpg","_microblog":{"username":"chrispoole"}},"_microblog":{"date_relative":"2016-10-04 23:00","date_timestamp":1475622000,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}}]}