With Outlook, you have all your email inboxes in view. The software makes it easy to manage multiple accounts. Not only different Microsoft accounts, but also other email service accounts can be integrated. If required, you can delete the account with just a few clicks. We’ll show you how.
Continuous integration tools make everyday work easier for developers. If you want to use agile methods for software development (continuous integration), it requires either a lot of discipline and effort, or you can make use of helpful CI tools. These tools assist you with automation and other useful features. In this article, we provide an overview of some of the most popular and best continuous...
With continuous delivery, software developers automate the process of development, quality assurance, testing, production, and delivery. This gives them the opportunity to deliver software to the customer at a much earlier stage of development while the program continues to be developed. The continuous delivery pipeline required for this is divided into different test phases. What are these, what...
The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.
How can we be sure that we are all talking about the same object? The Uniform Resource Name (URN) makes it possible to clearly identify a resource – regardless of when and where. This has proven especially useful for libraries. Books and magazines, as well as movies and videos, can be assigned a name with URN, regardless of where the media is presently located.
The process of “reverse engineering” allows you to understand the functionality and structure of software. By reverse engineering software down to the source code, it is not only possible to understand incorrect messages, but also to analyze competing programs. Reverse engineering can therefore be used in many ways. But how exactly is reverse engineering applied in software development?
In order to provide the best support for the rapid progress in hardware development, system software is also constantly being improved. Along with comfort, performance and security are crucial factors. One good example is the GUID Partition Table (GPT) partition style, which has already replaced the classic master boot record in many system architectures. We’ll show you why.
Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...
How do companies get a clear idea of the needs of their target group? The empathy map is a simple way to quickly obtain a good impression of the real problems of potential and existing customers, provided that you use the method in a team that has a degree of sensitivity. We present the empathy map with a definition and example.
If you own an Amazon smart speaker like the Amazon Echo, you’re probably quite familiar with Alexa. The speech software, which gives the interactive speakers a voice and reacts to the user's voice commands, can also be integrated into your own devices. With some preparation and an Amazon Developer account, for example, you can turn Raspberry Pi into an Alexa speaker.