window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Design Pattern

A B C D F G I K L M N O P Q S T U V W X Y
  • Adapter Pattern - Adapter Entwurfsmuster Programmieren lernen

Adapter Pattern

2023-12-10T19:27:22+01:00Tags: , , , , , , , , , , , , |

The Adapter Pattern is a structural design pattern for software that allows objects with incompatible interfaces to work together. It converts the interface of a class into another interface so that this API then meets the functional requirements and is easily maintainable without changing the source code of the original class. The properties of the Adapter Pattern are always very useful when an API to be adapted is not within the sphere of influence of the software to be changed.

Asynchronous communication

2024-11-30T10:33:21+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Asynchronous communication is not only a technical concept, but also influences the way software is developed and delivered. Asynchronous communication methods can improve the user experience by reducing the waiting time for the user.

Authentication

2024-11-22T08:27:45+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is a multi-step process in identity management. Authentication in an IT system implements IT security functions that are realized by various security services and components.

  • Bootstrapping in der Softwareentwicklung

Bootstrapping

2023-12-15T16:09:26+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , |

What is bootstrapping? Bootstrapping is the technical way in which a software stack is defined, i.e. how an application is configured and started. Bootstrapping is therefore a typical deployment process.

  • Bridge-Pattern Konzept in der Softwareentwicklung - Softwarearchitektur Pattern

Bridge pattern

2023-12-22T08:04:55+01:00Tags: , , , , , , , , |

The bridge pattern is a design pattern for software that serves to decouple an abstraction from your implementation so that both software components can be changed independently of each other without influencing each other. Bridge patterns are useful tools for creating flexible, modular and easy-to-maintain systems.

  • Komplexität beherrschen: Gesundheitswesen. Klare Anforderungen. Git.

Clear requirements & standards in software development – mastering complexity

2025-01-15T13:22:02+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , |

Clear requirements in software development are essential. Digital transformation is not a question of if, but how. The complexity of our digital infrastructure presents us with major challenges...

Cloud service models

2025-01-10T11:07:00+01:00Tags: , , , , , , , , , , , , , , , , |

What is a cloud service model? Cloud service models define key characteristics of a cloud and classify cloud service models with corresponding provision modes.

  • Clustering Algorithmus - Algorithmen zum Clustern von Daten

Clustering algorithm

2023-12-08T09:52:05+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Would you like to know what a clustering algorithm is? Find out what the clustering algorithm is and what you can use it for. We explain how a clustering algorithm works in pseudocode.

  • Confidential Computing - Technologische Grundlagen und Herausforderungen

Confidential computing – technological foundations and challenges

2024-05-21T18:30:05+02:00Categories: Cloud Computing & Cloud Technology, Unkategorisiert|Tags: , , , , , , , , , , , , , , , , , , , |

Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.

Go to Top