Blog & Articles

Article

The Sovereignty Trap: Between Tiananmen and Trump

We talk a big game about values and privacy, yet depend on AI that either denies historical atrocities or could cut us off tomorrow. Is this what Europe gets for dropping the ball on high tech infrastructure?

Blog Post

Mobile Portale mit HATEOAS und Self-Contained Systems

Bei INNOQ setzen wir seit Jahren erfolgreich auf Self-Contained Systems und vertikalisierte Ansätze. Teams können unabhängig entwickeln, Services lassen sich separat deployen und skalieren - eigentlich ein perfektes Setup. Doch ein Problem blieb hartnäckig bestehen: Wie baut man Portale, die Daten aus verschiedenen SCS elegant zusammenführen?

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Practical Considerations & Recommendations

Article

From Data Graveyards to Knowledge Landscapes

Europe is sitting on a wealth of public data—but much of its potential remains untapped. The challenges are well known: fragmented portals, incompatible interfaces, and growing reliance on non-European platforms that slow innovation. While new industrial data spaces are emerging—enabling secure and sovereign exchange of sensitive information—public and industrial data ecosystems remain largely siloed. This article explores how Artificial Intelligence (AI) and the Model Context Protocol (MCP) can help bridge that gap and accelerate Europe’s shift from Open Data to Open Knowledge—supporting digital sovereignty and delivering greater value to society.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Decision Dimensions for Authorization Patterns

Choosing the right patterns is critical, as it directly impacts the system’s security posture, performance, scalability, and maintainability.

Article

Pragmatische Architekturdokumentation für Entwicklungsteams

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authorization Patterns

Authorization patterns explain how distributed systems organize their access control — where and how decisions happen, where policies live — and influence, in turn, how identities and related attributes travel between components.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Identity Propagation Patterns

Without trustworthy identity propagation, even strong initial authentication can be undermined — weakening trust boundaries and ultimately impairing the system’s ability to make reliable authorization decisions.

Blog Post

AI — Behind the Buzzword Garbage

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authentication Patterns

Without knowing who the subject is, without verifying its identity, there is only a limited way to perform meaningful access decisions.

Blog Post

Business Model Canvas: Geschäftsmodelle sichtbar machen

Der Business Model Canvas hilft, zentrale Fragen frühzeitig zu klären: Wer sind unsere Kund:innen? Welches Problem lösen wir? Und wie erzeugen wir damit echten Mehrwert? Gerade an der Schnittstelle zwischen IT und Business schafft das Modell ein gemeinsames Verständnis – und hilft, technische Entscheidungen mit der Geschäftsperspektive zu verbinden.

Blog Post

What’s Wrong with the Current OWASP Microservice Security Cheat Sheet?

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Core Concepts

In part two of my series, I begin the journey to rethink the OWASP Microservice Security Cheat Sheet. This post focuses on core concepts, laying the groundwork for practical, real-world microservice security.

Blog Post

First Agile, Then Agentic

Agentic AI is supposed to accelerate software development. But new technologies can only reach their full potential when organizations adapt their structure, processes, and culture. Most organizations today are not yet able to truly benefit from faster software development. The prerequisite for this are the capabilities shaped by the agile and DevOps movements.

Article

Asset Administration Shell und Model Context Protocol

Freund oder Feind?

Blog Post

Context Engineering

Have you ever wondered how chatbots, copilots, or virtual assistants seem to know just the right things to say — or sometimes, spectacularly fail? The difference often comes down to one crucial skill: context engineering.

Blog Post

Primacy-Recency

Was am Anfang gesagt wird oder zum Schluss hängen bleibt, prägt oft das gesamte Gespräch. Dieses Phänomen ist als Primacy-Recency-Effekt bekannt – und beeinflusst, wie wir Informationen aufnehmen, Gespräche bewerten und Entscheidungen treffen. Gerade in Meetings, Präsentationen oder Feedbacksituationen kann das entscheidend sein. Wer den Effekt kennt, kann ihn gezielt nutzen – zum Beispiel, um relevante Inhalte besser zu platzieren und Kommunikation wirksamer zu gestalten.

Article

Technical and other Debt in IT Systems

A Broad Perspective

Article

Common Approaches in the Field of Socio-Technical Architectures

In the age of digitalization and modernization, companies face the challenge of not only keeping up with technological advancements but also optimizing their organizational structures. Socio-technical architectures play a crucial role in this process by focusing on the flow of work, team collaboration, and the seamless integration of technical and social systems. This article explores two key approaches—Team Topologies and Domain-Driven Design (DDD)—and demonstrates how they can help organizations take the first steps toward consciously designing their socio-technical architecture.

Article

Internal Development Platforms

Internal Developer Platforms (IDPs) help us accelerate software development. They represent the natural evolution of developments over the past decades. We’d like to show why this is the case with a historical overview and then examine current challenges.

Article

Don’t Forget the People

When Architectural Changes Become a Change Project

Article

Enabling Stakeholders as a Success Factor

Sociotechnical architectures consider both technical and human-organizational aspects and promote their effective collaboration. To ensure the successful design and implementation of these systems, it is crucial to actively involve stakeholders and address their interests. In this article, we explore why enabling stakeholders represents a key function in sociotechnical projects and how you can implement this approach effectively.

Blog Post

Plattformen für AI: Daten und APIs als digitales Fundament

Eine aktiv gemanagte Plattform von Daten und Diensten ist die Grundlage für agentenfähige Systeme. Nur wer Daten und Dienste gemeinsam zugänglich macht, schafft die nötige Basis für AI. Agenten brauchen klar beschriebene Datendienste – und eine Plattform, die diese zur Verfügung stellt.

Article

How Much Thinking Can a Team Handle?

Blog Post

Agenten - Kreise - Firmen

In Teil 2 habe ich Ihnen versprochen, die probabilistische Weltsicht zu beleuchten, mit der Machine Learning Experten schon immer vertraut sind, und die uns allen mit agentischen KI-Systemen bevorsteht. Wir befassen uns damit, was genau in unserem Fall das Lernende System ist, welche neue Rolle dabei Menschen einnehmen, und wie die Vision des CEO von Microsoft Satya Nadella zur Firma der Zukunft aussieht.