Blog
Articles
On our blog you will find both substantive articles and news. There will also be case studies described in detail. See the Articles category.

A few words about stakeholders
6.04.2017
> "Find the right balance of competing claims of different stakeholder groups. All claims deserve attention, but some are more important than others."
>
>…

In search of lost quality
14.03.2017
"Quality is a certain degree of excellence."
With these words --- taken from Plato --- I would like to start a new series of publications introducing…

Modes of operation of block ciphers
6.03.2017
*Symmetric block ciphers* encrypt messages of a specific length that is specific to the chosen algorithm (e.g. 16 bytes for the AES algorithm, 8 bytes…

Aligning DevOps transformation with organizational culture
2.03.2017
The dominant organizational culture model for DevOps is the one described in the '2016 State of DevOps Report', created by Westrum. I would like to propose…

Data encryption
16.01.2017
So far, I have dealt with the implementation of integrity and authentication services for uploaded data. It is high time to deal with secrecy, that is,…

Surprising situations during training
9.12.2016
Anything can happen during training. Nevertheless, the trainer should not assume in advance that it will be something unpleasant and stressful. Most of…

Message authentication
8.11.2016
In a previous post on integrity, there was the problem of checking whether a message came from the original source. In other words, whether it was sent…

Shorten, or integrity in practice
4.10.2016
Integrity (integrity) service is one of the four basic services of information protection. It performs the function of ensuring that the processed information…

Application architecture on the Android platform
26.09.2016
Why does architecture matter? An application's architecture defines its individual components, the functions they perform, and the relationships between…

Basic information protection services
30.08.2016
Nowadays, a component of almost every IT system is its security architecture. It should develop from the beginning of the system's design and form an…

Enterprise Search in a Nutshell
22.08.2016
Earlier this year, Salesforce, a popular SaaS CRM solution provider, released a report titled. "[State of IT 2016](https://www.salesforce.com/form/pdf/2016-state-of-it.jsp)."…

Training objectives from the perspective of an IT training trainer
10.08.2016
In this article I would like to look at one of the key issues determining successful training, namely "the objectives of training". It would seem: a cliché,…