Blog & Articles

Blog Post

Fetch-Tools vs. Browser-Rendering in Agenten-Setups

„Eine URL abrufen“ klingt trivial, kann aber innerhalb eines Agenten schnell chaotisch werden. Ein Teil der Verwirrung entsteht durch Dokumentation, die nicht sauber trennt, was die einzelnen Web-Tools eigentlich leisten.

Blog Post

I sandboxed my coding agents. You should too.

LLM coding agents are extremely powerful because they can run programs on our computers using our permissions. However, this same power also makes us very vulnerable. It only takes one mistake or one prompt injection to compromise the whole system.

Blog Post

Leave It Better Than You Found It

An Unexpected Architecture Win

Blog Post

Why not scatter @Transactional everywhere?

@Transactional — great when you know when not to use it. Use it consciously instead of sprinkling it everywhere!

Article

Was, da geht noch mehr? Noch mehr Besonderheiten von und mit Java

Bereits vor ein paar Jahren haben wir uns Dinge angeschaut, die in Java funktionieren, aber sehr ungewöhnlich sind. Diese Liste werden wir in dieser Folge des Praktikers ergänzen.

Blog Post

From FOMO to Focus

Clear Priorities in the AI Jungle with AI Opportunity Mapping

Blog Post

Speed vs. Skill

Every AI coding tool promises the same thing: unprecedented speed, effortless productivity, freedom from tedious work. The pitch is compelling. But what if feeling more productive and being more capable aren’t the same thing? Research shows that automation makes us feel more productive while eroding our skills. Let’s examine this tension through the lens of cognitive psychology.

Article

Menschenlesbare Datenformate mit Jackson verarbeiten

Wir nutzen tagtäglich Datenformate. Zum Austausch von Informationen mit anderen Systemen oder auch zur Definition von Dingen wie unserem Build oder zur Konfiguration unseres Systems. Manche davon sind binär, aber auch viele bis heute direkt von Menschen lesbar. Für die Verarbeitung von JSON in Java hat Jackson eine hohe Verbreitung erreicht. Aber Jackson kann mehr als nur JSON, wie wir in diesem Artikel sehen werden.

Blog Post

Context Engineering: Managing AI-Generated Code Complexity

Keeping your scope small was always a good idea

Article

Prompts als Programm in GPT-5

All Caps, Gebettel und Geschrei – Schnee von gestern. GPT-5 befolgt brutal jede Instruktion, selbst in versteckten Nebensätzen. Und verhungert, wenn wir nicht genau sagen, was wir wollen. Welche Konsequenzen hat das für Prompt Engineering und Agentenentwicklung?

Blog Post

Swiss Army Knife for Salesforce: LLM with In-Memory Database

Large Language Models (LLMs) struggle with transforming large datasets, particularly when performing aggregations that require calculations - essentially anything where you’d normally use GROUP BY or ORDER BY in SQL. But what if we need to retrieve extensive data from a system and process it with an LLM, but only have an API with limited functionality available? In this blog post, I present a solution I’ve implemented and tested.

Blog Post

Git Clarity: Building Meaningful Commits and Linear History

A personal workflow for intentional development and cleaner Git logs

Article

Achieving Digital Sovereignty with Standard Software

In the context of IT system landscapes, digital sovereignty is often equated with autarky— complete independence from third parties. By that logic, , a company developing and operating all applications in-house would be the ultimate example of digital sovereignty. But does this idea really hold up?

Article

Managing Geopolitical Risks with Enterprise Architecture

IT leaders in Europe increasingly face questions about whether geopolitical developments – such as data protection disputes or trade conflicts between the EU and the US – threaten the viability of US cloud services. The risks range from price increases and legal uncertainties to potential usage restrictions. CIOs must not only ensure functional IT operations but also proactively assess external risks. This article demonstrates how enterprise architecture methods can help identify risks early and develop viable alternatives.

Blog Post

Modern Legacy (dank KI)

Warum der Fokus auf Code in der KI-Ära zu kurz greift

Blog Post

Modern Legacy (thanks to AI)

The discussion around software modernization is currently dominated by solutions involving artificial intelligence (AI) in software development. AI-assisted code completion, agentic software engineering, and other tools promise to massively accelerate development processes. The obvious thought is to apply these tools directly to existing code as well: refactorings, re-documentation, or even generated code for new features in legacy systems. Technically, much of this is already possible, and the buzzword industry is once again in full swing. Yet these code-centric, AI-driven approaches can be shortsighted for organizations tangled in a jungle of legacy systems. A modernization that focuses solely on code quickly leads to modern legacy: systems that appear technically advanced and well documented thanks to AI, but whose actual purpose has long become questionable.

Article

A Governance Framework for Digital Sovereignty

In an increasingly connected world where digital infrastructure forms the backbone of our economy and society, the topic of digital sovereignty is gaining more and more attention. For decision-makers in German-speaking countries, this goes far beyond merely selecting a cloud provider. It’s about strategic agency, resilience, and the ability to actively shape one’s digital future. This article explores how a robust governance methodology can help organizations not only understand digital sovereignty but also put it into practice—without sacrificing convenience or innovation.

Article

The Path to Heterogeneous Cloud Platforms

Article

Digital Sovereignty: Why Architecture Matters and How to Make Your Company Resilient

In an era where digital systems form the backbone of our economy and society, control over one’s digital future is increasingly becoming the focus of strategic decisions. For many technology decision-makers in German-speaking regions, this is not just a political or regulatory challenge, but a fundamental task with far-reaching implications for software architecture work.

Article

Data Inventories in the EU Data Act: The Democratization of IoT Devices

Starting in September 2025, the EU Data Act (Regulation (EU) 2023/2854) will require companies that collect or process data from connected devices to maintain comprehensive data inventories.

Article

Digital Sovereignty as Self-Understanding

Article

EU Data Act: The Beginning of the End for Cloud Monoculture?

What has the EU ever done for us? …well, aside from free movement, no roaming charges, consumer protection, the single market, Erasmus, and more. But also: excessive bureaucracy, slow decisions, overregulation down to the much-mocked bottle cap – a favorite symbol for anyone blaming Europe for every innovation shortfall.

Article

Think Locally: On-Premise LLMs as Drivers of Competitive Advantage

Consider this scenario: Your organisation has integrated AI tools into critical business processes, your legal team has carefully reviewed data processing agreements, and your IT department has configured systems to comply with GDPR requirements. Then, a foreign court issues an order that overrides all these protections, requiring your AI provider to indefinitely retain data that should be deleted—including potentially sensitive corporate information shared by your employees.

Blog Post

Software Analytics going crAIzy!

From analyzing problems in software systems to working solutions with AI

Article

Digitale Souveränität – Ein Definitionsversuch

Der Begriff Digitale Souveränität trägt die Wolkenwende. Beim Versuch einer Definition ist es unvermeidlich, verschiedene Perspektiven einzunehmen. Weniger, was das Digitale angeht – hier stehen ganz klar Informationstechnologie und Software im Fokus. Souveränität allerdings ist als Begriff eine andere Größenordnung.