Blog & Articles

Article

Digital Sovereignty as Self-Understanding

How implementation teams can escape the we-are-not-Google trap and collectively take responsibility for European solutions to European problems.

Article

EU Data Act: The Beginning of the End for Cloud Monoculture?

What has the EU ever done for us? …well, aside from free movement, no roaming charges, consumer protection, the single market, Erasmus, and more. But also: excessive bureaucracy, slow decisions, overregulation down to the much-mocked bottle cap – a favorite symbol for anyone blaming Europe for every innovation shortfall.

Article

Think Locally: On-Premise LLMs as Drivers of Competitive Advantage

Blog Post

Software Analytics going crAIzy!

I’ve long been an advocate of treating software like data and analyzing it accordingly with tools like Python, pandas, Jupyter Notebook, Neo4j, and jQAssistant. In the era of AI and code transformation tools, seeing software as data gets more and more important when you want to improve your software system at a large scale. This blog post is a short interim report from me about my efforts taking software analysis to the next level.

Article

Digitale Souveränität – Ein Definitionsversuch

Der Begriff Digitale Souveränität trägt die Wolkenwende. Beim Versuch einer Definition ist es unvermeidlich, verschiedene Perspektiven einzunehmen. Weniger, was das Digitale angeht – hier stehen ganz klar Informationstechnologie und Software im Fokus. Souveränität allerdings ist als Begriff eine andere Größenordnung.

Article

Digitale Souveränität: Warum die Architektur zählt und wie Sie Ihr Unternehmen resilient machen

Article

The Sovereignty Trap: Between Tiananmen and Trump

We talk a big game about values and privacy, yet depend on AI that either denies historical atrocities or could cut us off tomorrow. Is this what Europe gets for dropping the ball on high tech infrastructure?

Blog Post

Mobile Portale mit HATEOAS und Self-Contained Systems

Bei INNOQ setzen wir seit Jahren erfolgreich auf Self-Contained Systems und vertikalisierte Ansätze. Teams können unabhängig entwickeln, Services lassen sich separat deployen und skalieren - eigentlich ein perfektes Setup. Doch ein Problem blieb hartnäckig bestehen: Wie baut man Portale, die Daten aus verschiedenen SCS elegant zusammenführen?

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Practical Considerations & Recommendations

Article

From Data Graveyards to Knowledge Landscapes

Europe is sitting on a wealth of public data—but much of its potential remains untapped. The challenges are well known: fragmented portals, incompatible interfaces, and growing reliance on non-European platforms that slow innovation. While new industrial data spaces are emerging—enabling secure and sovereign exchange of sensitive information—public and industrial data ecosystems remain largely siloed. This article explores how Artificial Intelligence (AI) and the Model Context Protocol (MCP) can help bridge that gap and accelerate Europe’s shift from Open Data to Open Knowledge—supporting digital sovereignty and delivering greater value to society.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Decision Dimensions for Authorization Patterns

Choosing the right patterns is critical, as it directly impacts the system’s security posture, performance, scalability, and maintainability.

Article

Pragmatische Architekturdokumentation für Entwicklungsteams

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authorization Patterns

Authorization patterns explain how distributed systems organize their access control — where and how decisions happen, where policies live — and influence, in turn, how identities and related attributes travel between components.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Identity Propagation Patterns

Without trustworthy identity propagation, even strong initial authentication can be undermined — weakening trust boundaries and ultimately impairing the system’s ability to make reliable authorization decisions.

Blog Post

AI — Behind the Buzzword Garbage

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authentication Patterns

Without knowing who the subject is, without verifying its identity, there is only a limited way to perform meaningful access decisions.

Blog Post

Business Model Canvas: Geschäftsmodelle sichtbar machen

Der Business Model Canvas hilft, zentrale Fragen frühzeitig zu klären: Wer sind unsere Kund:innen? Welches Problem lösen wir? Und wie erzeugen wir damit echten Mehrwert? Gerade an der Schnittstelle zwischen IT und Business schafft das Modell ein gemeinsames Verständnis – und hilft, technische Entscheidungen mit der Geschäftsperspektive zu verbinden.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Core Concepts

Blog Post

What’s Wrong with the Current OWASP Microservice Security Cheat Sheet?

Modern microservice architectures require evolving security practices. Yet popular resources like the OWASP Microservice Security Cheat Sheet are starting to show their age and need a fresh look.

Blog Post

First Agile, Then Agentic

Agentic AI is supposed to accelerate software development. But new technologies can only reach their full potential when organizations adapt their structure, processes, and culture. Most organizations today are not yet able to truly benefit from faster software development. The prerequisite for this are the capabilities shaped by the agile and DevOps movements.

Article

Asset Administration Shell und Model Context Protocol

Freund oder Feind?

Blog Post

Context Engineering

Have you ever wondered how chatbots, copilots, or virtual assistants seem to know just the right things to say — or sometimes, spectacularly fail? The difference often comes down to one crucial skill: context engineering.

Blog Post

Primacy-Recency

Was am Anfang gesagt wird oder zum Schluss hängen bleibt, prägt oft das gesamte Gespräch. Dieses Phänomen ist als Primacy-Recency-Effekt bekannt – und beeinflusst, wie wir Informationen aufnehmen, Gespräche bewerten und Entscheidungen treffen. Gerade in Meetings, Präsentationen oder Feedbacksituationen kann das entscheidend sein. Wer den Effekt kennt, kann ihn gezielt nutzen – zum Beispiel, um relevante Inhalte besser zu platzieren und Kommunikation wirksamer zu gestalten.

Article

Technical and other Debt in IT Systems

A Broad Perspective

Article

Common Approaches in the Field of Socio-Technical Architectures

In the age of digitalization and modernization, companies face the challenge of not only keeping up with technological advancements but also optimizing their organizational structures. Socio-technical architectures play a crucial role in this process by focusing on the flow of work, team collaboration, and the seamless integration of technical and social systems. This article explores two key approaches—Team Topologies and Domain-Driven Design (DDD)—and demonstrates how they can help organizations take the first steps toward consciously designing their socio-technical architecture.