adesso Blog
14.05.2024 By Christian Del Monte
Keep data changes under control with Change Data Capture
In a distributed software system, data changes always pose a challenge. How is it possible to track the change history of data located in one part of the system in order to synchronise connected data stores in other subsystems? Change Data Capture (CDC) offers an answer to this question. I explain what this is all about in this blog post.
Read more13.05.2024 By Andreas Honert and Alexandra Windisch
Change management - the wild dance between external consultants and the internal organisation
When we search the internet for projects that are managed through change management, we often find projects in the IT environment that are associated with organisational changes. Change management helps organisations to adapt to the changed conditions brought about by the IT project. In our blog post, we show you how a change management project becomes a beautiful "dance".
Read more10.05.2024 By Viktoria Düngfelder
Overview of large group moderation - effective methods for successful events
Interactive formats are an effective alternative to conventional conferences as they encourage dialogue between participants. Large group facilitation is a socio-psychological method for communicating and making decisions effectively in large groups. This blog post presents common methods of large group facilitation and explains how they can be used successfully.
Read more08.05.2024 By Stephen Lorenzen
European hydrogen revolution: a digital future is unfolding
Hydrogen has the potential to play a key role in the European energy transition. In addition to technological advances in the field of hydrogen production, storage and application, digitalisation also plays a decisive role in the development of this industry. This blog post explains the digitalisation potential and fields of application behind this in more detail.
Read more07.05.2024 By Michael Mamerow
NIS 2 ante portas: How CISOs can sleep more soundly with Microsoft
NIS 2 can seem like an invincible giant in many ways to an organisation that must be compliant by 18/10/2024 and has not been regulated until now. Of course, the world of cyber threats continues to turn in parallel with the urgent implementation of the directive, and even seems to be heading inexorably towards us, and unfortunately, thanks to GenAI, ever faster. Microsoft offers a wide range of products that address the NIS 2 Principles. In this blog post, I explain what these are, what advantages they offer and what specifically needs to be done.
Read more06.05.2024 By Pascal Groß
Can Customer Identity and Access Management increase customer satisfaction for insurers?
Customer identity and access management is used to control a user's digital access and manage their data. As a rule, the main focus here is on regulatory aspects. In my blog post, I would like to show you that it is also worthwhile for insurance companies to deal with this topic in terms of the user experience.
Read more02.05.2024 By Yannik Rust
Big Data Streaming with AWS: Architecture Design
In the age of digital innovation and data-driven decision-making, the efficient processing and analysis of data is a decisive competitive advantage. Especially where real-time information can make the difference between success and failure, big data streaming is indispensable. Amazon Web Services (AWS) offers a wide range of services and tools with which companies can collect, process and analyse data in real time. I show what this is all about in my blog post.
Read more29.04.2024 By Yelle Lieder
Green IT Strategy - Strategy development for sustainable IT
The path to sustainable IT is often not hindered by a lack of expertise or tools, but by a lack of strategic perspective. Although the knowledge and tools for more sustainable IT solutions are readily available, corporate IT is lagging behind when it comes to sustainability. In this blog post, I explore why this is the case and what needs to change.
Read more26.04.2024 By Marcel Erfurth
Cybercrime of tomorrow: Trends and dangers of future cyberthreats
In turbulent times, we face numerous challenges: from national conflicts to economic crises. But alongside these problems lurks a growing threat: cybercrime, which is no longer just a playground for hobby hackers, but a field for organised groups with state support. What trends and dangers are we facing? And how can companies protect themselves effectively? I deal with these questions in my blog post.
Read more