All articles by date
YARP – A fast and reliable reverse proxy
In this article we aim to take a closer look at YARP and provide an overview of the configuration options provided to us by Microsoft.
Tester Teatime (Part 2): Spelling in applications – anything but trivial
“Tester Teatime” is a blog post format, which addresses topics that testers deal with on a daily basis. The second part of this blog format deals with the questions: What is the connection of spelling and software development and which impact have spelling errors on the usability of an application?
GraalVM – A look at performance
GraalVM promises better runtime properties and the integration of multiple programming languages. How about the performance? Why should GraalVM have a much better performance? What makes it different from conventional JDKs?
Security and compliance in software projects – getting dependencies under control
This blog post addresses the high standards of security and compliance that we have to meet in every software project. Trained security engineers are responsible for ensuring that we achieve this within any given project. An especially persistent challenge they face is dealing with the countless dependencies present in software projects, and getting them – and their variety of versions – under control.
Test automation tool from the catalogue – How do I find the perfect tool?
One of the first steps in introducing a test automation strategy is to evaluate suitable test automation tools. Since each project is unique, both the requirements and the choice of tools vary. This blog series is intended to provide guidance in selecting the appropriate solution.
Application Security Tools: Use for Static Application Security Testing & Software Composition Analysis
Im Bereich der Application Security gibt es verschiedene Konzepte, um das Ziel zu erreichen, zuverlässige und sichere Software zu entwickeln. In diesem Beitrag werden das Static Application Security Testing (SAST) und die Software Composition Analysis (SCA) als wichtige Bestandteile der Application Security vorgestellt. Zur Umsetzung dieser Konzepte und Erhöhung der Application Security können entsprechende Tools eingesetzt werden.
OAuth in Single-Page-Apps
A large part of the apps we use regularly provide individual data and services for different users and therefore need to be able to clearly identify their users. The classic approach here would be to build a login form and manage it with its own user database, but this can have some disadvantages. This article presents the alternative approach with the protocols “OAuth” and “OpenID Connect”, which were developed for the purpose of secure authentication and authorisation.
IoT (and more) with Azure Digital Twins
As the Industry 4.0 concepts mature, we will look at the Azure edition of Digital Twins. The definition of Digital Twins assumes the digital representation of real-world things’ (or people’s) properties, either in real time (for control and predictive maintenance) or in simulations to acquire and test behaviors before actual deployment. As such, Azure Digital Twins are closely related to Azure IoT services; however, they could do a bit more, as we will see in this blog article.
A New AI Approach to Modelling Uncertain Knowledge in Medicine
How can AI-based systems compensate for the deficiencies of human reasoning when dealing with statistical or incomplete data is of interest? This is particularly relevant in areas where wrong decisions have far-reaching consequences, such as medicine.
Patient care of the future – Digital Health Solutions with Azure Health Data Services
Not only since the beginning of the Covid pandemic has the healthcare sector been facing a various challenges. Here, digitalisation and the use of modern technologies such as artificial intelligence or machine learning offer numerous opportunities and potentials for increasing efficiency, reducing errors and thus improving patient treatment.