Blog & Articles

Blog Post

Schweizer Messer für Salesforce: LLM mit In-Memory-Datenbank

Large Language Models (LLMs) sind notorisch schlecht darin, Transformationen auf großen Datenmengen auszuführen, insbesondere Aggregationen, bei denen gerechnet werden muss - also alles, wo man in SQL zu GROUP BY oder ORDER BY greifen würde, zum Beispiel. Was machen wir aber, wenn wir umfangreiche Daten aus einem System beschaffen und im LLM verarbeiten wollen, aber nur eine API mit begrenzter Funktionalität zur Verfügung haben? In diesem Blogpost stelle ich eine mögliche Lösung vor, die ich erprobt habe.

Blog Post

Mobile Portale mit HATEOAS und Self-Contained Systems

Bei INNOQ setzen wir seit Jahren erfolgreich auf Self-Contained Systems und vertikalisierte Ansätze. Teams können unabhängig entwickeln, Services lassen sich separat deployen und skalieren - eigentlich ein perfektes Setup. Doch ein Problem blieb hartnäckig bestehen: Wie baut man Portale, die Daten aus verschiedenen SCS elegant zusammenführen?

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Practical Considerations & Recommendations

Article

From Data Graveyards to Knowledge Landscapes

Europe is sitting on a wealth of public data—but much of its potential remains untapped. The challenges are well known: fragmented portals, incompatible interfaces, and growing reliance on non-European platforms that slow innovation. While new industrial data spaces are emerging—enabling secure and sovereign exchange of sensitive information—public and industrial data ecosystems remain largely siloed. This article explores how Artificial Intelligence (AI) and the Model Context Protocol (MCP) can help bridge that gap and accelerate Europe’s shift from Open Data to Open Knowledge—supporting digital sovereignty and delivering greater value to society.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Decision Dimensions for Authorization Patterns

Choosing the right patterns is critical, as it directly impacts the system’s security posture, performance, scalability, and maintainability.

Article

Pragmatische Architekturdokumentation für Entwicklungsteams

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authorization Patterns

Authorization patterns explain how distributed systems organize their access control — where and how decisions happen, where policies live — and influence, in turn, how identities and related attributes travel between components.

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Identity Propagation Patterns

Without trustworthy identity propagation, even strong initial authentication can be undermined — weakening trust boundaries and ultimately impairing the system’s ability to make reliable authorization decisions.

Blog Post

AI — Behind the Buzzword Garbage

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Authentication Patterns

Without knowing who the subject is, without verifying its identity, there is only a limited way to perform meaningful access decisions.

Blog Post

Business Model Canvas: Geschäftsmodelle sichtbar machen

Der Business Model Canvas hilft, zentrale Fragen frühzeitig zu klären: Wer sind unsere Kund:innen? Welches Problem lösen wir? Und wie erzeugen wir damit echten Mehrwert? Gerade an der Schnittstelle zwischen IT und Business schafft das Modell ein gemeinsames Verständnis – und hilft, technische Entscheidungen mit der Geschäftsperspektive zu verbinden.

Blog Post

What’s Wrong with the Current OWASP Microservice Security Cheat Sheet?

Blog Post

Updating OWASP’s Microservice Security Cheat Sheet: Core Concepts

In part two of my series, I begin the journey to rethink the OWASP Microservice Security Cheat Sheet. This post focuses on core concepts, laying the groundwork for practical, real-world microservice security.

Blog Post

First Agile, Then Agentic

Agentic AI is supposed to accelerate software development. But new technologies can only reach their full potential when organizations adapt their structure, processes, and culture. Most organizations today are not yet able to truly benefit from faster software development. The prerequisite for this are the capabilities shaped by the agile and DevOps movements.

Article

Asset Administration Shell und Model Context Protocol

Freund oder Feind?

Blog Post

Context Engineering

Have you ever wondered how chatbots, copilots, or virtual assistants seem to know just the right things to say — or sometimes, spectacularly fail? The difference often comes down to one crucial skill: context engineering.

Blog Post

Primacy-Recency

Was am Anfang gesagt wird oder zum Schluss hängen bleibt, prägt oft das gesamte Gespräch. Dieses Phänomen ist als Primacy-Recency-Effekt bekannt – und beeinflusst, wie wir Informationen aufnehmen, Gespräche bewerten und Entscheidungen treffen. Gerade in Meetings, Präsentationen oder Feedbacksituationen kann das entscheidend sein. Wer den Effekt kennt, kann ihn gezielt nutzen – zum Beispiel, um relevante Inhalte besser zu platzieren und Kommunikation wirksamer zu gestalten.

Article

Technical and other Debt in IT Systems

A Broad Perspective

Article

CIO-Fragestellungen zur digitalen Souveränität

Was passiert, wenn europäische Unternehmen morgen keine US-Cloud-Dienste mehr nutzen dürfen – oder sie sich diese schlicht nicht mehr leisten können? IT-Verantwortliche brauchen Antworten – nicht auf Basis von Bauchgefühl, sondern faktenbasiert. In diesem Beitrag geht es darum, mögliche Risiken in der Nutzung US-amerikanischer Cloud-Services zu beleuchten und zu identifizieren, wie Methoden der Enterprise Architektur dabei helfen können, diese zu meistern.

Article

Common Approaches in the Field of Socio-Technical Architectures

In the age of digitalization and modernization, companies face the challenge of not only keeping up with technological advancements but also optimizing their organizational structures. Socio-technical architectures play a crucial role in this process by focusing on the flow of work, team collaboration, and the seamless integration of technical and social systems. This article explores two key approaches—Team Topologies and Domain-Driven Design (DDD)—and demonstrates how they can help organizations take the first steps toward consciously designing their socio-technical architecture.

Article

Enabling Stakeholders as a Success Factor

Article

Internal Development Platforms

Internal Developer Platforms (IDPs) help us accelerate software development. They represent the natural evolution of developments over the past decades. We’d like to show why this is the case with a historical overview and then examine current challenges.

Article

Don’t Forget the People

On paper, the architecture vision is perfect. It addresses all pressing deficiencies of the existing system, aligns seamlessly with the business domain, and enables teams to retain more work within their boundaries. Finally, we will enjoy higher speed-to-market and a significant reduction in (non-value-adding, tedious) coordination efforts between teams. Surely, everyone will immediately see how much better our new architectural vision is. Not quite.

Blog Post

Plattformen für AI: Daten und APIs als digitales Fundament

Article

How Much Thinking Can a Team Handle?

The term Cognitive Load has become a common reference point in recent discussions about team structures, roles, and task distribution in IT organizations. However, these discussions often fail to distinguish between the different purposes of IT organizations and frequently rely on an oversimplified concept of Cognitive Load.