
adesso Blog
16.07.2023 By Stefan van der Steen
PGP: Specification vs. Implementation
Stefan explains the difference between the PGP specification and its implementations in this blog post, highlighting the importance of understanding this distinction. PGP allows flexibility in the order of operations, but the specification doesn't mandate a specific order for the packets. However, there is an exception for the order of signature packets. The author recommends signing the message before encryption and suggests encrypting both the message and the signature for sender anonymity. It concludes by stating that knowing these details would have been beneficial when starting with PGP.
Read more03.07.2023 By Stefan van der Steen
PGP: What keys are used
Welcome back to our journey into the world of PGP (Pretty Good Privacy). In our previous blog, we discovered the remarkable features of PGP. Now, it's time to unlock the secrets of PGP keys. Join us as we unravel the intricacies of key sets, delve into key IDs, and explore the optimal choices for encryption. By the end, you'll have the knowledge to harness the true potential of PGP and navigate the encryption landscape with confidence. Let's dive in and uncover the magic of PGP keys!
Read more26.06.2023 By Ko Turk
Green Software Engineering: Best Practices
Discover practical ways to combat climate change and reduce your carbon footprint! This engaging blog post highlights the urgency of the issue and provides easy-to-follow tips. From measuring and improving website sustainability to making eco-conscious backend and architecture decisions, you'll find actionable steps to contribute to a greener future. Don't miss out on choosing the right hardware and hosting provider for a more sustainable online presence. Join the movement today and make a positive impact on our planet!
Read more23.05.2023 By Stefan van der Steen
What you need to know about PGP
Discover the basics of PGP (Pretty Good Privacy), an encryption system vital for online security. In a series of blog posts, the author breaks down the key principles of PGP, including signing, compression, and encryption. PGP combines symmetric and asymmetric encryption, using a unique session key encrypted with the recipient's public key for secure messaging. By understanding PGP, users can ensure the integrity and confidentiality of their digital communications.
Read more29.03.2023 By Arjan Schoe
Protecting Your Business: The Importance of World Backup Day
World Backup Day is a global initiative that takes place annually on the 31st of March. It was established to raise awareness about the importance of data backup and to encourage individuals and businesses to protect their critical data. On this day, people are reminded of the devastating consequences of data loss and the importance of having a backup plan in place.
Read moreOver the past few decades, the technology industry has grown rapidly, transforming the world we live in today. While the industry has seen significant growth, it has also been marked by a persistent gender gap. Women have historically been underrepresented in technology roles, with only a small percentage of women occupying positions in technical and leadership roles.
Read more15.11.2022 By Eugène Dauphin
Is Low-code development the next digital transformation for organisations?
Studies show that Low-code will increasingly replace traditional software development in the coming years. Let’s find out how to get started with Low-Code in an easy way and have a closer look on the areas of application in this blog, to make your start with Low-code successful!
Read more17.06.2022 By Ainara Novales
Low-code development: the age of citizen developers
Low-code development platforms are becoming increasingly popular with companies because they enable them to create applications independently, even if they have little or no programming knowledge. In my blog post, I’ll describe the origins of low-code, explain how it works and list important considerations for its implementation.
Read more26.04.2022 By Christian Everke
Two thinking systems and their influence in software development
The day-to-day work in software development is work that requires a lot of brainpower. It involves high cognitive demands and skills in which perception and attention play a special role. The problem with this is that the way people think can be distorted. A distorted way of thinking leads to thinking traps and consequently to mistakes. Anyone who has mastered a few perceptual-psychological basics can adapt their way of working and especially their programming style in a way that avoids thinking traps and recognises mistakes more quickly.
Read more