2. /
  3. News


Tech Blog

30. July 2021

In the last part of the series I showed you how to setup a Kafka cluster for development with…

Tech Blog

20. May 2021

Today I’m going to show you how to setup a local Apache Kafka cluster for development using Docker…

Tech Blog

27. April 2021

In this blogpost I describe a transformer project, how I proceeded, the results, the pitfalls and…

Tech Blog

26. April 2021

Path traversal is a security vulnerability (CWE-23: Relative Path Traversal), that can be abused by…

Tech Blog

27. January 2021

You are using React? You want to implement the functionality to draw on a map? You are already using…

Tech Blog

21. January 2021

Open redirect is a security vulnerability (CWE-601: URL redirection to untrusted site), that can be…

Tech Blog

19. June 2020

The usual way of dependency injection with CDI using @Inject offers an extremely efficient mechanism…

Tech Blog

10. June 2020

by Jakob Schröder and Dr. Philipp Bongartz



This blog post is a data exploration in the context of…

Tech Blog

21. January 2020

A typical Machine Learning (ML) problem is about prediction such as in Forecasting for data-driven…