window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Software Design

B C G N S T
  • Bootstrapping in der Softwareentwicklung

Bootstrapping

2023-12-15T16:09:26+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , |

What is bootstrapping? Bootstrapping is the technical way in which a software stack is defined, i.e. how an application is configured and started. Bootstrapping is therefore a typical deployment process.

  • Komplexität beherrschen: Gesundheitswesen. Klare Anforderungen. Git.

Clear requirements & standards in software development – mastering complexity

2025-01-15T13:22:02+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , |

Clear requirements in software development are essential. Digital transformation is not a question of if, but how. The complexity of our digital infrastructure presents us with major challenges...

  • Coden im Team - Warum gemeinsam programmieren so effektiv ist

Coding in a team: Why programming together is so effective

2023-12-06T10:06:40+01:00Categories: Learn programming, Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Coding in a team: How to realize better software and achieve better results with other developers. You'll learn why it pays to collaborate with other software developers & how to specifically improve your own skills.

  • Confidential Computing - Technologische Grundlagen und Herausforderungen

Confidential computing – technological foundations and challenges

2024-05-21T18:30:05+02:00Categories: Cloud Computing & Cloud Technology, Unkategorisiert|Tags: , , , , , , , , , , , , , , , , , , , |

Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.

Nuxt

2024-11-10T20:17:37+01:00Tags: , , , , , , , , , , , , , , , , , , , , |

Nuxt.js is a framework for building Vue.js applications. Nuxt.js is a web-app-framework for building Vue.js applications. The Nuxt framework helps software developers take advantage of a modern web app concept with the features built into it.

  • Sortieralgorithmen - Der Sortieralgorithmus bei der Programmierung

Sorting algorithms

2023-12-07T14:16:43+01:00Tags: , , , , , , , , , , , , |

Sorting algorithms are a set of algorithmic methods that arrange items in a collection or list in a specific order, often numerically or alphabetically. We provide you with an easy-to-understand explanation and clear illustrations of the complexity of sorting algorithms.

  • TLS Protocol - The TLS handshake

TLS protocol

2024-12-03T16:45:10+01:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

What is a TLS protocol? - A TLS protocol ensures secure communication between two hosts on the basis of a transport-protected connection. TLS protocols are part of the transport layer.

Go to Top