![](/adesso-de/adesso-de/news/blog/header/blog-header-4000x2731-metadaten_W640xH864_CUTOUT.jpg)
adesso Blog
22.03.2022 By Maurizio Bianchi
Quarkus – A convincing Framework
I have been developing applications using #java since release 1.0. I have gone through all the different enterprise releases starting Servlets and EJB 1.0 to now with #Java EE/#Jakarta EE.
Read more01.03.2022 By Marius Voskamp
A journey to good software
My goal in software development is to build programmes and features that people need and like to use. Only on the way did I slowly realise that simply writing code would probably not be enough. This journey continues to this day. In my blog post, I would like to share the crucial insights and changes of mind I had and give you an idea of what the world of software development is like.
Read more30.11.2021 By Katharina Gimbel
Agile validation in the context of an existing V-model CSV framework Part II
Fitting an agile development project into a waterfall-driven CSV framework and quality system can be a challenge. The first part of this series describes thorough preparation of some key topics before the start of the project to set a good foundation for this endeavor. Like the agile ceremonies and artifacts, the CSV tasks should be an integral part of the overall agile project planning. Likewise, the agile development approach is recommended to be described in the Validation Plan. This article shares best practices and observations and gives insights to some concrete activities that should be considered during the course of such a project.
Read more23.11.2021 By Daniel Lenzen
Access rights management with Keycloak as your IAM system
Applications often contain resources that should only be available to certain users. Management users, for example, administer the information of their employees, whereas sales users administer the information of their customers. This requires closed areas, access to which is controlled by permissions. In this blog post, I would like to show you how to manage these access permissions in Keycloak and how to assign them to groups of users.
Read more12.10.2021 By Ediz Turcan
Not all security vulnerabilities are created equally
I was asked by a group of colleagues to pentest a portal to check that it is secure. As luck would have it, the test revealed only a small number of security vulnerabilities. There was one that really stood out, however. I’ll explain what it was and what took place after the vulnerability was discovered in my blog post.
Read more09.09.2021 By Philipp Storck
The SAP Service Cloud – what it’s really about
Customers deserve professional service. Good service goes hand in hand with sales. They both draw on the same data from the same sources and round it all off to create a customer experience that is second to none. SAP Service Cloud is just the right solution to deliver flawless customer service. In my blog post, I’ll describe the benefits and added value that SAP Service Cloud can offer companies.
Read more22.06.2021 By Davide Beretta
This is why the "Yocto Project" is a power solution
14.06.2021 By Dominik Wehberg
CSS cascade made easy | CSS cascading
CSS is short for cascading style sheet. But how exactly does the cascade work? I'll explore this topic and lead you through the CSS inheritance process on the pages to follow. You will also learn all about the different types of style sheets and how the weighting of individual selectors is calculated in detail.
Read more12.04.2021 By Stephan Wies
Service mesh – just another fad to add to the collection of buzzwords?
Microservices have many advantages. But the monitoring and maintenance of complex microservice architectures are time-consuming. The so-called service mesh can provide a remedy. Stephan Wies explains in this article how this works and what advantages and disadvantages it offers.
Read more