Testing Spring Boot JMS with ActiveMQ Artemis and Testcontainers
Currently, I’m teaching JMS with Spring Boot at the University of Applied Science in Bern, Switzerland. We use Apache ActiveMQ Artemis as the JMS message broker. But how can we test our Spring Boot application?
Java Champion
Vor kurzem wurde mir die Ehre zuteil als Java Champion gewählt zu werden. Es ist eine der höchsten Auszeichnungen die man in der Java-Community erhalten kann und für die Ernennung bin ich den Java Champions äusserst dankbar!
IT Security Audits
IT security checks are crucial for the security of your IT systems and data. In this article, we discuss everything about IT security audits, their benefits, types of audits, audit processes and provide a helpful checklist for conducting an IT security audit for your company.
Standard Software vs. Custom Software
A question that often arises: should software be developed in-house or purchased off-the-shelf? In this article, we’ll explore both custom and standard software, their respective advantages and disadvantages, and explain when to use each.
Strategic IT Planning
The topic of strategic IT planning is a complex one and can pose a challenge for many organizations. In this article, we delve into and explain this topic, while also examining the relevant challenges and trends.
IT Strategy
What makes a good IT strategy? In this article, we take a look at one of the most important artifacts of IT management.
IT Infrastructure Security
In this article, we will focus on the topic of IT security. This is a very broad subject, and we will thus not be able to cover every aspect exhaustively. Nevertheless, we hope to provide you with an overview of this immensely important topic.
The advantages of custom software
In this article, we will explore the main benefits and disadvantages of custom software and when & why to use each.
IT Security for Small Businesses
In this article, we delve into the topic of IT security for small businesses. We explore the reasons why IT security is crucial for them, the potential consequences and costs of cyberattacks, and provide practical advice on assessing security gaps, choosing and implementing secure IT solutions, and educating employees on IT security.
Legacy IT infrastructure
In many organizations, legacy IT systems and applications can still be found. They are known to be hopelessly outdated, yet they cannot be done away with. Is it a hopeless situation?
IT infrastructure for small businesses
For most people, it often operates unnoticed as a black box in the background and only becomes noticeable when something doesn’t work: the IT infrastructure. What makes it so important and how do you implement it correctly in your own small business?
Software modernization
In the following article, you’ll learn what software modernization is and how you can use it to improve the performances of your company.