window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Cloud

A C J M O Q S Y

Asynchronous communication

2024-11-30T10:33:21+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Asynchronous communication is not only a technical concept, but also influences the way software is developed and delivered. Asynchronous communication methods can improve the user experience by reducing the waiting time for the user.

Authentication

2024-11-22T08:27:45+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is a multi-step process in identity management. Authentication in an IT system implements IT security functions that are realized by various security services and components.

  • Komplexität beherrschen: Gesundheitswesen. Klare Anforderungen. Git.

Clear requirements & standards in software development – mastering complexity

2025-01-15T13:22:02+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , |

Clear requirements in software development are essential. Digital transformation is not a question of if, but how. The complexity of our digital infrastructure presents us with major challenges...

  • Cloud Computing

Cloud

2025-01-06T21:46:24+01:00Tags: , , , , , , , , , , , , , , , , , , , , |

What is cloud? Cloud or cloud computing moves data and programs from desktop PCs or servers in a company to remote cloud servers. Cloud storage therefore consists of a standard server network in a cloud data center or distributed across several cloud server locations.

  • Confidential Computing - Technologische Grundlagen und Herausforderungen

Confidential computing – technological foundations and challenges

2024-05-21T18:30:05+02:00Categories: Cloud Computing & Cloud Technology, Unkategorisiert|Tags: , , , , , , , , , , , , , , , , , , , |

Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.

Java

2024-11-27T09:27:48+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

What is Java suitable for in programming? Java is very popular as the official language for developing Android apps. It is a general purpose programming language. This programming language is supported by Google and a large active community of developers.

Micro front end

2024-12-02T05:21:34+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

The micro frontend is a design pattern that uses the strengths and advantages of microservices to improve the user experience of a web frontend.

  • OpenID - OpenID Foundation - Standards für digitale Identitäten

OpenID

2023-12-13T08:37:57+01:00Tags: , , , , , , , , , , , , , , , , , , , , , |

All about OpenID - Discover everything you need to know about OpenID: from secure authentication and identity federation to the latest developments like OpenID Connect and the OpenID Foundation. Here you will find a comprehensive overview of digital identity.

Go to Top