What we at Flownative think and do

Flownative Blog

Insights into our work, sneak peeks at projects, interesting technology, …

  • Removal of outdated PHP versions 8.0 & 8.1from Beach

    PHP 8.0 has served us well. So did PHP 8.1 But now it's time to move on–to newer PHP 8 versions.

    No longer supported by the developers, PHP 8.0 no longer receives any updates at all since November 26th 2023. As the PHP website states:

    Each release branch of PHP is fully supported for two years from its initial stable release. […]

    After this two year period of active support, each branch is then supported for an additional year for critical security issues only. […]

  • Removal of outdated PHP version 7.4 from Beach

    PHP 7.4 has served us well over the past years. But now it's time to move on–to PHP 8.

    No longer supported by the developers, PHP 7.4 will no longer receive any updates at all from November 28th on. As the PHP website states:

    Each release branch of PHP is fully supported for two years from its initial stable release. […]

    After this two year period of active support, each branch is then supported for an additional year for critical security issues only. […]

  • Updated Guides available

    Today the content of our guides for Beach, Local Beach and Lifeguard was checked and updated. Now all instructions and examples are up-to-date and working again.
  • Updating Neos - Why, When and How

    On this year's Neos Conference I presented a talk on updating Neos. I tried to answer three questions:

    1. Why you should be updating
    2. When you should be updating
    3. How to do updates
    The video
  • SSH Host Updates and Key Rotation

    On Tuesday, 08.03.2022, we will roll out a new SSH server configuration and provide new SSH host keys. Expect a warning when you try to connect to your instance via SSH after our upgrade and replace the old key in your known_hosts file with the new fingerprint.

    Crypto is evolving

    Security is an ongoing process and requires continuous adaption. As new weaknesses are discovered and new algorithms are being developed, configuration must be adjusted and cryptographic keys be replaced.