A deep-dive into the topic of zero-trust architecture with a look on the history of zero-trust, an implementation example as well as the questions and challenges that arose during its implementation.
A deep-dive into the topic of zero-trust architecture with a look on the history of zero-trust, an implementation example as well as the questions and challenges that arose during its implementation.
In this article Thomas, Richard and Thomas demonstrate the usability of Microsoft’s Copilot. They highlight its usability, the possibility of integration and price points. All this is accompanied by an example of building your own Copilot for a real-world use-case.
When writing tests, it’s not only about whether they really correctly test your code and how much coverage they achieve. One important thing is also how much information you’ll get when there is a failing test. Ever since I am using Kotlin, I am using the combination...
This year we made a comparison of different tools. Our author Markus describes how we proceeded with the evaluation and what our takeaways were.
In this article we show how you can improve the security of your software supply chain without spending money for software licenses. For this, we present useful open-source tools for automated dependency updates, vulnerability scanning of dependencies, license scanning, SBOM generation, secret detection and scanning of infrastructure as code for vulnerabilities and misconfiguration.
Our authors Pascal and Bastian investigated the Google Software Delivery Shield which is Google’s fully managed solution for software supply chain security. In this article they describe how software supply chain security can be achieved during the different steps of the software development lifecycle with the Google Software Delivery Shield.
Our author Daniel gives an introduction into Software Supply Chain Security in software development processes and highlights its importance. The article stresses how neglecting security in the software development process can lead to successful attacks, compromising users‘ data and systems. It also provides tips on achieving Software Supply Chain Security, including scanning for vulnerabilities, updating dependencies, and secret detection.
This year our colleague Anna participated in two Women in Data Science conferences, in Zürich and Villach. She shares her experience with us in this blog post.
There are three main types of telemetry data – often referred to as pillars of observability – that are typically gathered: metrics, logs and traces. Here we focussed on tracing which enables visualizations making it possible to understand the performance characteristics of a distributed system.
In the swiftly changing world of software development, the choice of programming language plays a crucial role. To emphasize this, our colleagues Lukas and Georg effectively developed a Microservice Architecture in Kotlin for one of the largest direct banks in Germany. With numerous years of expertise in Java, this project marked their most extensive exploration of Kotlin. Join them on their fascinating voyage as they explain why Kotlin proved to be a superior choice over Java.
Sie sehen gerade einen Platzhalterinhalt von Facebook. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von Instagram. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von X. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie müssen den Inhalt von reCAPTCHA laden, um das Formular abzuschicken. Bitte beachten Sie, dass dabei Daten mit Drittanbietern ausgetauscht werden.
Mehr Informationen