More and more companies are using technologies and are constantly expanding them with individual functions that increasingly support processes in companies. The data obtained in this way are often worth protecting and critical for the company. The non-transparent storage of the data therefore creates a risk for companies. As early as in the coalition agreement, the governing parties commit themselves to preserving and regaining technological sovereignty. The focus is on alternatives to current US providers, which often offer cloud and software solutions without sufficient transparency. Due to the fact that we will become more and more dependent on technologies in the future, the sovereignty over their administration should lie in the hands of the German entrepreneurs. This article shows current risks in the cooperation with large US providers and explains the use of open source software as an alternative solution for creating digital sovereignty. Risk 1: Vendor LockIn The reason…
You surely know one or even several such people for whom empathy and compassion seem to be a foreign word. And yet it is…
You surely know one or even several such people for whom empathy and compassion seem to be a foreign word. And yet it is…
You surely know one or even several such people for whom empathy and compassion seem to be a foreign word. And yet it is…
According to current survey of 1000 executives In Germany, the shortage of skilled workers is one of the top 3 critical blockers of company…
The abbreviation PaaS , short for Platform as a Service , describes the middle tier of the cloud service models. The main benefit is,…
I wrote a lot of text during my doctorate and texts are very important, especially in an academic context. In the following I have…
With SaaS , short for Software as a service , the third service model of clouds is now described at this point. Applications can…
In ophthalmology, tunnel vision stands for a concentric narrowing of the field of vision to a central remainder ( Wikipedia ). You will surely…
