First8 is gespecialiseerd in het pragmatisch ontwikkelen van bedrijfskritische Java toepassingen waarbij integratie van systemen, hoge eisen aan beveiliging en veel transacties een belangrijke rol spelen.
Op deze pagina vindt je onze blogs. Op www.first8.nl vind je ons nieuws, de agenda, vacatures en meer.
We know it’s all too common in Java to get a NullPointerException when we use an object reference which is null. This happens when our code tries to access a method or field of an object, or element of an array when there’s no instance present – e.g. it refers to null.
In todays modern IT architecture, domains are quite the thing. Domains are supposed to be as much isolated from each other as possible. If you have an application that manages sensitive data (and really, when do you not have sensitive data?), you need to think about security. Programmatic security In many cases, you can get away with role-based security (e.g. … Lees verder Security with microservices: programmatic security with Keycloak
Managing users in Keycloak can be done manually via the admin console (if you are running it locally, it can be found on http://localhost:8080/auth). If you have an LDAP service somewhere, you could also integrate that and manage the users via that. In this blog post, we’ll examine a simple way to manage users programmatically. We could use the Admin REST … Lees verder Programmatically adding users in Keycloak
If you have services or domains in your architecture, you probably have them to be able to develop them independently. In most cases, Message Queue’s are used to communicate between these services. But how does this work if one service upgrades the messages it is sending while the consuming services are still on an older version? In this blog post, we’ll … Lees verder Forward compatible messaging
Previously, we posted a blogpost about hashed password storage. In our most recent First8 friday videoblog, I presented this strategy. If we have hashed passwords based on a fast algorithm, this post presents a strategy to migrate to slow hashing, as graceful as possible. Until the last possible moment we defer switching over completely. A strategy that can be applied … Lees verder Migration scenario to a safer password store
In het weekend van 29 & 30 augustus was het Maker Faire festival in Eindhoven. Dit is een jaarlijks event waar groot publiek geniet van tech-bedrijven die hun creativiteit op het gebied van de moderne techniek delen. First8 sponsorde dit high-tech festival en had er een informele stand. Er was veel belangstelling voor ons, mede dankzij onze vrolijke 3D-Led Cubes. … Lees verder First8 sponsort de Maker Faire in Eindhoven
In a project we are working on, we need to serve a lot of images. These images are user-controlled content and as such we need to dynamically scale and serve them. Throughout the website, we use these images in different sizes. We don’t want to predefine all these sizes since they tend to change quite often with the layout. So … Lees verder Efficient Image Handling with Spring