```Worldline Engineering Blog _ __ __ __ __ _ | | / /____ _____ / /____/ // /(_)____ ___ | | /| / // __ \ / ___// // __ // // // __ \ / _ \ | |/ |/ // /_/ // / / // /_/ // // // / / // __/ |__/|__/ \____//_/ /_/ \__,_//_//_//_/ /_/ \___/ ______ _ _ / ____/____ ____ _ (_)____ ___ ___ _____ (_)____ ____ _ / __/ / __ \ / __ `// // __ \ / _ \ / _ \ / ___// // __ \ / __ `/ / /___ / / / // /_/ // // / / // __// __// / / // / / // /_/ / /_____//_/ /_/ \__, //_//_/ /_/ \___/ \___//_/ /_//_/ /_/ \__, / /____/ ____ __ /____/ / __ ) / /____ ____ _ / __ |/ // __ \ / __ `/ / /_/ // // /_/ // /_/ / /_____//_/ \____/ \__, / /____/ ``` # Latest entries ## The OAuth proxification guide for frontend developers with Microsoft EntraID Ibrahim Gharbi | 11 Min To Read | 04 Feb, 2025 | #Software engineering, #Cybersecurity > Basically for most frontend developers, OAuth integration means adding a third party authentication library to your application. But for some cases, having an OAuth proxy is a good solution to integrate your applications with a third party identity provider. => 2025_02_04_oauth_proxification_guide_for_frontend_developers.gmi ## Gemini, but the other one Gerben Castel | 6 Min To Read | 28 Jan, 2025 | #Open source and collaboration, #Web and mobile technology > Since the end of 2023, there has been constant talk about Google Gemini and its potential importance in the IT landscape. So I thought I should take an interest in Gemini, but since I don’t like to do things like everyone else, I’m going to focus on a Gemini that I’ve had on my radar for a few years: The Gemini Protocol, and you’ll see… it has nothing to do with Google. => 2025_01_28_gemini-the-other-one.gmi ## JBang, the awesome scripting tool of the Java ecosystem Yassine Benabbas | 15 Min To Read | 21 Jan, 2025 | #Development and programming > Let’s explore how JBang can make scripting in Java a reality. => 2025_01_21_jbang.gmi ## Death by bullet points - How to be read in a digital world? Simon Mercier, Ludovic Faucon | 5 Min To Read | 14 Jan, 2025 | #Development and programming, #Digital management and strategy > Have you ever questioned the use of bullet points in your presentations? => 2025_01_14_death-by-bullet-points.gmi ## Proper key management in the cloud with a Cloud Secure Module Jurjen N.E. Bos | 22 Min To Read | 07 Jan, 2025 | #Cybersecurity > I describe a “Cloud Secure Module”, a software alternative to cloud HSMs that solves some of the security problems associated with HSMs in the cloud. => 2025_01_07_cloud-transformation.gmi ## Software Patterns - From Textbook To Reality Max Beckers, Michael Zinsmaier | 9 Min To Read | 10 Dec, 2024 | #Development and programming, #Software engineering > You studied design patterns? Let us leave the textbooks behind and escape to reality! => 2024_12_10_software-patterns-from-textbook-to-reality.gmi