adesso Blog
12.10.2021 By Ediz Turcan
Not all security vulnerabilities are created equally
I was asked by a group of colleagues to pentest a portal to check that it is secure. As luck would have it, the test revealed only a small number of security vulnerabilities. There was one that really stood out, however. I’ll explain what it was and what took place after the vulnerability was discovered in my blog post.
Read more09.09.2021 By Philipp Storck
The SAP Service Cloud – what it’s really about
Customers deserve professional service. Good service goes hand in hand with sales. They both draw on the same data from the same sources and round it all off to create a customer experience that is second to none. SAP Service Cloud is just the right solution to deliver flawless customer service. In my blog post, I’ll describe the benefits and added value that SAP Service Cloud can offer companies.
Read more22.06.2021 By Davide Beretta
This is why the "Yocto Project" is a power solution
14.06.2021 By Dominik Wehberg
CSS cascade made easy | CSS cascading
CSS is short for cascading style sheet. But how exactly does the cascade work? I'll explore this topic and lead you through the CSS inheritance process on the pages to follow. You will also learn all about the different types of style sheets and how the weighting of individual selectors is calculated in detail.
Read more12.04.2021 By Stephan Wies
Service mesh – just another fad to add to the collection of buzzwords?
Microservices have many advantages. But the monitoring and maintenance of complex microservice architectures are time-consuming. The so-called service mesh can provide a remedy. Stephan Wies explains in this article how this works and what advantages and disadvantages it offers.
Read more23.03.2021 By Lars Schmiedeberg
Agile validation in the context of an existing CSV V-Model framework (Part I)
Computer System Validation (CSV) in GxP-regulated industries like pharmaceutical and medical device manufacturing is the testing and documenting to see if the software is fit for its intended use, is compliant to external regulations and internal procedures, thus providing a high degree of assurance that risks to patients, product quality and data integrity are minimized. This first part of the blog describes how to plan and what to do prior commencement of the project to fit in the agile validation approach with an existing CSV V-model process.
Read more22.03.2021 By Tobias Deininger
Data protection in software development part III – Data minimisation – Less is more
Data is the new gold of the digital age. So why not own as much as possible? The answer to this question is presented in the third part of my ‘privacy in software development’ blog series. I’ll also introduce you to the principle of data minimisation in more detail.
Read more18.02.2021 By Tobias Deininger
Data protection in software development part II – Privacy by default
How nice would it be to live in a world in which you as a software user wouldn’t have to care about 99 per cent of what went on and your data would still be protected. That can be more than just a dream. In the second part of my ‘Data protection in software development’ blog series, I explain what you should keep in mind when it comes to software development and introduce the principle of privacy by default.
Read more19.01.2021 By Tobias Deininger
Data protection in software development
Does the issue of data protection always give you a headache? Us developers are confronted with huge challenges time and again, especially when we’re only made aware of the requirements for the software we have to develop late on in the development phase. In the first part of my ‘Data protection in software development’ series, I would like to introduce you to the principle of privacy by design.
Read more