The year is coming to an end in a couple of hours.
Today is New Year’s Eve and I am sitting here in my holidays at the Baltic Sea, reading and evaluating some abstracts for the APEX Connect 2023 in Berlin, while waiting for the "big" party.
I decided to write this blogpost to give a better insight and explain, how easy it is to implement Faceted Search with different reports, like we did in this example with the Kanban Board.
In 2011, the developers at PaaS operator Heroku developed a set of rules that applications should follow if they want to be optimally prepared for operation in the cloud: the Twelve-Factor App methodology.
TRIOLOGY underwent the TISAX assessment in the first quarter of 2021. Our ISMS (Information Security Management System) was assessed by Dekra to determine whether it meets the security level of the target maturity level “high” and whether we thus fulfill the industry-wide uniform security standards.
Before the pandemic, people were used to travel to the training location to participate. Now, however, during the pandemic, things are a little different. Many companies now offer their training online.
ITSM (IT Service Management) is intended to help achieve a structured and uniform way of working through processes to prevent each employee working differently and the quality of the work being different. In addition, processes are to reduce the workload of the employees.
Anyone trying to sell services or products must know before the first meeting with potential customers to whom they are to be delivered. Entire departments in companies are involved in researching suitable target groups in order to align their advertising campaigns, product presentation and much more in the best possible way. They try to answer the question: “What kind of people are they with whom I want to have business relations?
The simplest result of a programmer’s work is the produced code, which implements the desired requirements as exactly as possible. This code is usually also delivered to the client. Usually this is done in the form of text files that can be read on any computer, even on smartphones, without special software. However, this is not “good night reading” – not even for a developer.
A proverb says: “Code should be executed, not read, otherwise it is useless! That is quickly said. But is it true?
So the next question is: “What target groups actually exist for code?
Recently I have developed an internal application for knowledge sharing using Oracle APEX. In this application, I have used many interesting new features from 19.2 and 20.1.
This blog post shows the construction of a neural network for an artificial intelligence. In addition, it is explained by way of example how this AI can be trained with the help of training data, backpropagation and evolution, but also which dangers can occur in this process.