Blog
DDoS: Permanent Data Flood Without a Protection Strategy – And How to Protect Against It
The Evolving Threat Landscape of Web Applications and IT Systems The threat landscape surrounding web applications and IT systems is becoming...
AI and Ethics: What Are Our Guidelines for the Use of AI? Part (3/3)
„Artificial intelligence is probably the best or the worst thing that can happen to mankind.“ (Stephen Hawking, physicist)„The power of artificial...
The Brave New World of AI and IT: Challenges and Opportunities
“Nothing is as constant as change.”(Heraclitus of Ephesus, 535–475 BC) It’s the year 2033. The hype surrounding LLMs and ChatGPT started ten years...
Software Architects and AI Systems: Challenges and Opportunities Part 2/3
„A good software architect is like a werewolf: Afraid of silver bullets.“ (loosely based on Jochen Mader (codepitbull))Since 2023, there has been a...
AGILA – Agile Software Architecture | Part 3/3
Welcome to the final part of the blog seriesAfter we covered the basics of software architecture, agile development in general, and agile...
AGILA – Agile Software Architecture | Part 2/3
Welcome to the next part of the blog series After covering the basics of software architecture and agile development in general in the previous...
AGILA – Agile Software Architecture | Part 1/3
What is it actually? In February 2001, 17 software developers met. From their perspective, the prevailing methods lacked flexibility and customer...
Software Architecture Gathering 2024
Essential for Software Architects!Get ready! We are proud to announce that we will once again be a sponsor and active participant at the Software...
Web security module from iSAQB – We are accredited!
"We are proud to have received the accreditation for the web security module. This certification is a testament to the quality of our training...
OOP 2024 – we are part of it!
It is good to rub and polish our minds against those of others. We can look back on a week full of interesting and enriching discussions at the OOP...