adesso Blog
28.05.2024 By Milena Fluck
Organising, decluttering, Dan-Sha-Ri - order trends for repositories
In my blog post, I present strategies for organising and tidying up filing systems. I show how professional organisation methods such as Dan-Sha-Ri or techniques from popular Netflix series can help to bring order to chaotic environments. You'll get step-by-step instructions for tidying, sorting, categorising, packing and labelling. It also discusses how these methods can improve the efficiency and comprehensibility of software systems.
Read more20.05.2024 By Christian Albring
AI revolution: Five interconnected factors that are boosting technological progress
The growth in the importance of artificial intelligence (AI) in recent years cannot be attributed to individual factors, but rather to the synergy of various interconnected and mutually reinforcing advances. Five factors are fuelling the rapid development of the AI movement. This blog post shows what these are in detail.
Read more17.05.2024 By Aynur Amirfallah
What is object tracking and which technology is best suited to my use case?
With advances in the field of artificial intelligence and machine learning, object tracking algorithms such as Multiple Object Tracking (MOT) and Single Object Tracking (SOT) are becoming increasingly intelligent and enable more accurate and faster object tracking. In this blog post, I show how MOT and SOT perform in different situations and present the results of an experiment that sheds light on the ideal application of object tracking.
Read more15.05.2024 By Edin Mujezinovic
The role of AI in the detection and defence against cyber attacks
We live in a time in which digital networking is constantly increasing and at the same time the number of cyber attacks is rising rapidly. These attacks are becoming increasingly sophisticated and represent a considerable burden for both companies and government organisations. This blog post shows how AI is being used in cybersecurity both as a tool for attackers and as a means of defence.
Read more14.05.2024 By Christian Del Monte
Keep data changes under control with Change Data Capture
In a distributed software system, data changes always pose a challenge. How is it possible to track the change history of data located in one part of the system in order to synchronise connected data stores in other subsystems? Change Data Capture (CDC) offers an answer to this question. I explain what this is all about in this blog post.
Read more10.05.2024 By Viktoria Düngfelder
Overview of large group moderation - effective methods for successful events
Interactive formats are an effective alternative to conventional conferences as they encourage dialogue between participants. Large group facilitation is a socio-psychological method for communicating and making decisions effectively in large groups. This blog post presents common methods of large group facilitation and explains how they can be used successfully.
Read more08.05.2024 By Stephen Lorenzen
European hydrogen revolution: a digital future is unfolding
Hydrogen has the potential to play a key role in the European energy transition. In addition to technological advances in the field of hydrogen production, storage and application, digitalisation also plays a decisive role in the development of this industry. This blog post explains the digitalisation potential and fields of application behind this in more detail.
Read more07.05.2024 By Michael Mamerow
NIS 2 ante portas: How CISOs can sleep more soundly with Microsoft
NIS 2 can seem like an invincible giant in many ways to an organisation that must be compliant by 18/10/2024 and has not been regulated until now. Of course, the world of cyber threats continues to turn in parallel with the urgent implementation of the directive, and even seems to be heading inexorably towards us, and unfortunately, thanks to GenAI, ever faster. Microsoft offers a wide range of products that address the NIS 2 Principles. In this blog post, I explain what these are, what advantages they offer and what specifically needs to be done.
Read more06.05.2024 By Pascal Groß
Can Customer Identity and Access Management increase customer satisfaction for insurers?
Customer identity and access management is used to control a user's digital access and manage their data. As a rule, the main focus here is on regulatory aspects. In my blog post, I would like to show you that it is also worthwhile for insurance companies to deal with this topic in terms of the user experience.
Read more