window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

IT Security

A C F I K O R S T
  • KI Frameworks - Libraries fuer Kuenstliche Intelligenz

AI Frameworks

2023-12-16T10:14:26+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

AI frameworks are collections of software libraries, tools and guidelines that are specifically designed for the development of artificial intelligence (AI) are designed. Such frameworks provide developers with a structured starting point with a powerful AI environmentin which they can develop and implement algorithms for machine learning (ML), deep learning, natural language processing (NLP) and other AI-related technologies. Top 10 AI frameworks, Types of AI frameworks, Technological aspects of AI frameworks Application areas and use cases of AI frameworks

Authentication

2024-11-22T08:27:45+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is a multi-step process in identity management. Authentication in an IT system implements IT security functions that are realized by various security services and components.

  • Komplexität beherrschen: Gesundheitswesen. Klare Anforderungen. Git.

Clear requirements & standards in software development – mastering complexity

2025-01-15T13:22:02+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , |

Clear requirements in software development are essential. Digital transformation is not a question of if, but how. The complexity of our digital infrastructure presents us with major challenges...

  • Confidential Computing - Technologische Grundlagen und Herausforderungen

Confidential computing – technological foundations and challenges

2024-05-21T18:30:05+02:00Categories: Cloud Computing & Cloud Technology, Unkategorisiert|Tags: , , , , , , , , , , , , , , , , , , , |

Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.

  • Cyberangriff auf Microsoft

Cyberattack on Microsoft – Fact-based analysis of the attack vectors

2024-01-22T19:50:34+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cyberattack on Microsoft - Fact-based analysis of the attack vectors. The most recent example of a sophisticated cyberattack is the cyberattack on Microsoft. This new IT hack on widely used standard software proves how vulnerable even leading technology companies with advanced security systems can be. Cyberattacks such as the one on Microsoft infrastructures are exemplary and must be regarded as a generally valid call for proactive protection in favor of robust cybersecurity architectures due to the widespread use of software solutions.

  • From Stargate to Europe: Why innovation has no future without values

From Stargate to Europe: Why innovation has no future without values

2025-01-27T19:52:05+01:00Categories: Artificial intelligence (AI)|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

From STARGATE to us in Europe: Why innovation has no future without values - What connects Trump's "Stargate" promise, Europe's invisibility in Davos and Elon Musk's statements at an AfD event? A common theme: responsibility

  • IT Security - Bridging the gap between Software development and IT Security Teams - Rock the prototype

IT Security: Bridging the Gap Between Software Development and IT-Security Teams

2023-09-07T14:01:59+02:00Categories: Cryptography, IT infrastructure, IT Security, Podcast, Software Architecture, Software development|Tags: , , , , , , , , , , , , , , , |

Unlock the Secrets to IT-Security and fortified Software: Discover why IT Security isn't just an add-on but a fundamental pillar in software development. From expert insights to actionable steps, our comprehensive guide reveals how to seamlessly integrate security measures for more robust applications. Don't let your software be the weakest link - read on to fortify your code and your business!

  • OpenID - OpenID Foundation - Standards für digitale Identitäten

OpenID

2023-12-13T08:37:57+01:00Tags: , , , , , , , , , , , , , , , , , , , , , |

All about OpenID - Discover everything you need to know about OpenID: from secure authentication and identity federation to the latest developments like OpenID Connect and the OpenID Foundation. Here you will find a comprehensive overview of digital identity.

Go to Top