
adesso BLOG
05.09.2023 By Oliver Kling
Security professionals and the brain surgeon paradox
What does brain surgery have to do with IT and application security? At first glance, not much. Nevertheless, I would like to look into this comparison in my blog post, because it strongly illustrates the importance of expertise and experience in complex areas.
Read more04.09.2023 By Mike Deecke
The ingenious data lake
A data lake, also known as a data platform, is an ingenious and highly effective solution for addressing the complex challenges that come with storing, managing and analysing vast quantities of data. It provides an advanced infrastructure that enables organisations to store data in its native form and be flexible with how they process it later. In my blog post, I will go through the advantages it brings to the table.
Read more01.09.2023 By Marc Mezger and Moritz Momper
Python development best practices part 1 – Tools & Zen
Python is one of the most widely used programming languages in the world and offers a wide range of possibilities to implement solutions professionally and efficiently. However, to realise the full potential of Python, it is essential to understand the best practices and apply them. In this blog post, we would like to present you with our guidelines for successful Python development.
Read more30.08.2023 By Florian Mock and Marie Macnee
Clash of the AIs: Bard and ChatGPT are like peanut butter and jelly
ChatGPT caused a major hype at the end of 2022. But ChatGPT may not be the end of the line. Google had laid claim to this title by introducing their own Bard AI model to the market. But which is the more powerful AI, ChatGPT or Bard? We will explore this question in our blog post. Read on to find out who comes out on top in the end.
Read more29.08.2023 By Marc Mezger
Open source large language models
What does open source mean, and why are open source language models actually so important? In my blog post, I will answer these questions and introduce you to three important open source large language models in more detail.
Read more28.08.2023 By Domenic See and Tobias Dieter
Cyber kill chain
The cyber kill chain framework was developed for use in analysing and defending against cyber attacks. The framework consists of a series of seven steps that describe the typical phases of a cyber attack. I will explain the steps involved and the advantages of this strategy to defend against cyber attacks in more detail in my blog post.
Read moreOccupational pension schemes and occupational health insurance plans are often faced with the challenge of having to implement a digital solution. In practical terms, this means they have to prepare the corresponding tender documents (including a catalogue of requirements), define the evaluation criteria for the quotations they receive and choose which of the bidding companies they wish to go with. You can find out how adesso supports (prospective) customers during the tender process in my blog post.
Read more23.08.2023 By Lilian Do Khac
AI roulette – a rough guide to AI applications that are allowed and those that are not
The European Union’s proposed AI Act will make working with artificial intelligence (AI) on a daily basis even more complex. Some potential AI applications might end up on a blacklist, while others remain untouched, but in a way, both applications use the same technology. It feels like AI roulette. The entire situation is poised to cause doubts during the idea phase of potential AI applications – namely, is my AI idea allowed? This is a question that crops up a lot at the moment.
Read more22.08.2023 By Yelle Lieder
Testing the sustainability of software – how do you test sustainability as a quality feature of software?
Sustainable IT is a question of software quality. Excellent software is sustainable and has as little negative impact on preserving a habitable environment as possible. In this blog post, we will look at what sustainability as a testable requirement in software quality assurance means and how we implement it.
Read more