Archive of posts in year '2020'

Please note: This archive page is only available in English. If a German version of a post is available, you can change the language once you've opened the post.
See all posts

Scroll down to see more ...

post icon Kubernetes AppOps Security Part 5: Pod Security Policies (1/2) – Good Practices

09/30/2020 Johannes Schnatterer in Software Craftsmanship

Kubernetes AppOps Security Part 5: Pod Security Policies (1/2) – Good Practices

Pod Security Policies (PSP) allow to use cluster wide settings that are used for all new containers. In comparison to the Security Context, the usage of PSPs not as easy, but especially for large organizations with large clusters it can be beneficial to use them, because they reduce the necessity for manual configuration.

Read more
post icon Scrum vs. Kanban - How to select the best agile methodology for you

09/17/2020 Daniel Huchthausen in Methods

Scrum vs. Kanban - How to select the best agile methodology for you

During the last years it became common to use agile methods in software development. The most widespread ones are Scrum and Kanban. The 2020 "State of Agile" survey found that a vast majority of companies (~65%) uses Scrum or Scrum hybrids. The second place is held by Kanban and "Scrumban" with about 15%. That is why we want to compare those two methodologies. 

Read more
post icon Backup and Restore with Cloudogu EcoSystem

08/27/2020 Daniel Huchthausen in EcoSystem

Backup and Restore with Cloudogu EcoSystem

With the Cloudogu EcoSystem you can easily and efficiently create backups for your entire toolchain, without any additional work. The backup and restore Dogu secures the data of your tools and allows you to easily restore it in case you need to.

Read more
post icon Impulses, Exchanges and Visions of the Digital Transformation

07/30/2020 Daniel Huchthausen in Insides

Impulses, Exchanges and Visions of the Digital Transformation

On July 17th the Digital Transformation Forum took place for the very first time. In 18 sessions, the almost 100 participants had the chance to get a taste of, learn about and swap ideas on the versatile topics of the digital transformation. The goal of the event was to offer impulses, exchange and visions for the digital transformation of companies.

Read more
post icon Remote Scrum: So close, and yet so far away

07/23/2020 Axel Lütgering in Methods

Remote Scrum: So close, and yet so far away

The general challenges of working from home and beyond seem to have been considered in detail from all perspectives. That's why in this post we will focus on how to use the Scrum method for remote work based on the example of our company’s experience. Thus, the article will be very concrete and hands-on: How does Cloudogu address the issue?

Read more
post icon The Effects of the Coronavirus Pandemic – An Experience Report

06/08/2020 Tatjana Ksienzyk in Insides

The Effects of the Coronavirus Pandemic – An Experience Report

The team here at Cloudogu has also been put to the test by the outbreak of the Coronavirus pandemic and the changes that have come with it. The company implemented its first set of sanitation measures in the early days of March. We made employees aware of the situation and distributed disinfectants to them. Everything seemed a bit surreal. But then everything happened very quickly.

Read more
post icon Kubernetes AppOps Security Part 4: Security Context (2/2) – Background

05/20/2020 Johannes Schnatterer in Software Craftsmanship

Kubernetes AppOps Security Part 4: Security Context (2/2) – Background

A container is basically a normal Linux process that runs isolated from the rest of the system via certain kernel components. This makes containers lighter but more vulnerable than virtual machines (VMs). To reduce this vulnerability to attack, the container runtimes offer a variety of settings whose default values strike a compromise between usability and security.

Read more
post icon How to use Clean Code Development effectively in 2020

05/19/2020 Artur Klosek in Quality

How to use Clean Code Development effectively in 2020

You can find out here how Clean Code Development can help you and what hurdles the integration of the approach entails in everyday life

Read more
post icon How to define software requirements in 2020

04/21/2020 Daniel Huchthausen in Methods

How to define software requirements in 2020

Whenever you start a project, the first step is to find out the initial requirements. Sometimes there is already a detailed functional concept, sometimes just a vague idea. The importatnt thing is that the requirements are explicit so that the final product will be able to meet them. If requriements are vague it is hard to be sure that they are being met.

Read more
post icon SCM-Manager now part of Cloudogu

04/15/2020 Daniel Huchthausen in Insides

SCM-Manager now part of Cloudogu

We are happy to announce that the Cloudogu GmbH is now officially the owner of the SCM-Manager project. This step is the consequent development of the cooperation between Cloudogu and SCM-Manager.

Read more
post icon IT compliance in practice – correctly containing and deleting data and projects in B2B software development

04/07/2020 Daniel Huchthausen in EcoSystem

IT compliance in practice – correctly containing and deleting data and projects in B2B software development

Since compliance is about adhering to regulations of any kind, this is very complex and individual issue. That's why this post will be dealing with a very specific topic: the deletion of data when the contract ends. In B2B software development, it is customary for contracts to contain a clause on the delivery or destruction of all records and documents related to the project.

Read more
post icon Kubernetes AppOps Security Part 3: Security Context (1/2) – Good Practices

03/17/2020 Johannes Schnatterer in Software Craftsmanship

Kubernetes AppOps Security Part 3: Security Context (1/2) – Good Practices

The virtual construct of a “container” is a normal Linux process at its core that largely runs in isolation from the rest of the system using certain kernel components. This makes containers lighter but more vulnerable than virtual machines (VMs). To reduce this vulnerability to attack, the container runtimes offer a variety of settings whose default values strike a compromise between usability and security.

Read more
post icon Docs As Code – Continuous Delivery of Presentations with reveal.js and Jenkins – Part 2

02/11/2020 Johannes Schnatterer in EcoSystem

Docs As Code – Continuous Delivery of Presentations with reveal.js and Jenkins – Part 2

The first part of this series demonstrated the use cases and benefits of delivering presentations with reveal.js. They are Docs As Code, and therefore they can be subjected to versioning management and of course delivered via Continuous Delivery. Furthermore, we demonstrate how the Jenkins pipelines can be used to deploy to GitHub Pages using a model concrete implementation. This article demonstrates additional alternatives for deployment (Sonatype Nexus and Kubernetes), while the general structure of the `Jenkinsfile` remains the same.

Read more
post icon Kubernetes AppOps Security Part 2: Using Network Policies (2/2) - Advanced Topics and Tricks

01/20/2020 Johannes Schnatterer in Software Craftsmanship

Kubernetes AppOps Security Part 2: Using Network Policies (2/2) - Advanced Topics and Tricks

In a Kubernetes cluster, everything (nodes, pods, Kubelets, etc.) can communicate with each other by default. If an attacker succeeds in exploiting a security vulnerability in one of the applications, he can easily expand his attack to all underlying systems in the same cluster. You can restrict this vulnerability using the on-board network policy features found in Kubernetes.

Read more