Pen and notebook on a desk

adesso Blog

595
AI

We live in a time in which digital networking is constantly increasing and at the same time the number of cyber attacks is rising rapidly. These attacks are becoming increasingly sophisticated and represent a considerable burden for both companies and government organisations. This blog post shows how AI is being used in cybersecurity both as a tool for attackers and as a means of defence.

Read more
Methodology

In a distributed software system, data changes always pose a challenge. How is it possible to track the change history of data located in one part of the system in order to synchronise connected data stores in other subsystems? Change Data Capture (CDC) offers an answer to this question. I explain what this is all about in this blog post.

Read more
Methodology

When we search the internet for projects that are managed through change management, we often find projects in the IT environment that are associated with organisational changes. Change management helps organisations to adapt to the changed conditions brought about by the IT project. In our blog post, we show you how a change management project becomes a beautiful "dance".

Read more
Methodology

Interactive formats are an effective alternative to conventional conferences as they encourage dialogue between participants. Large group facilitation is a socio-psychological method for communicating and making decisions effectively in large groups. This blog post presents common methods of large group facilitation and explains how they can be used successfully.

Read more
Industries

Hydrogen has the potential to play a key role in the European energy transition. In addition to technological advances in the field of hydrogen production, storage and application, digitalisation also plays a decisive role in the development of this industry. This blog post explains the digitalisation potential and fields of application behind this in more detail.

Read more
Methodology

NIS 2 kann einer Organisation, die bis zum 18.10.2024 compliant sein muss und bisher nicht reguliert war, in vielerlei Hinsicht wie ein unbesiegbarer Riese vorkommen. Die Welt der Cyber-Bedrohungen dreht sich natürlich parallel zur dringenden Umsetzung der Richtlinie weiter, scheint sogar unaufhaltsam auf uns zuzukommen, und dank GenAI leider immer schneller. Microsoft bietet eine breite Palette von Produkten an, die die NIS 2 Principles adressieren. Welche das sind, welche Vorteile sie bieten und was konkret zu tun ist, erläutere ich in diesem Blog-Beitrag.

Read more
Industries

Customer identity and access management is used to control a user's digital access and manage their data. As a rule, the main focus here is on regulatory aspects. In my blog post, I would like to show you that it is also worthwhile for insurance companies to deal with this topic in terms of the user experience.

Read more
Architecture

In the age of digital innovation and data-driven decision-making, the efficient processing and analysis of data is a decisive competitive advantage. Especially where real-time information can make the difference between success and failure, big data streaming is indispensable. Amazon Web Services (AWS) offers a wide range of services and tools with which companies can collect, process and analyse data in real time. I show what this is all about in my blog post.

Read more
Methodology

The path to sustainable IT is often not hindered by a lack of expertise or tools, but by a lack of strategic perspective. Although the knowledge and tools for more sustainable IT solutions are readily available, corporate IT is lagging behind when it comes to sustainability. In this blog post, I explore why this is the case and what needs to change.

Read more

Save this page. Remove this page.