
Sebastian Meindorfer
Cloud Engineersebastian.meindorfer@ars.de
Erfahren Sie mehr

Cloud-Plattformen und Automatisierungstechnologie

Cloud Enablement für IT-Organisationen

Cloud Landing Zones: Sicher landen in der Public Cloud

Architekturarbeit im Zeitalter Cloud-nativer Architekturen 3

LV1871: Mit ARS zur optimalen Cloud-Plattform

Solace

Architekturarbeit im Zeitalter Cloud-nativer Architekturen 2

Teil 4: Eigenschaften einer Cloud-native Architektur

Agile Cloud Enabling: Cloud Computing Training

Fünfzehn vor zwölf: Der Gang in die Cloud

Cloud-Native Netzwerksouveränität mit Cilium und Kubernetes

Architekturarbeit im Zeitalter Cloud-nativer Architekturen 1

Kurse & Workshops

Computer Aided Cloud Transformation

Teil 5 - Einfluss von Cloud-native auf die Architekturarbeit

Digitale Transformation: HUK ersetzt Papier durch Cloud

Infrastructure as Code (IaC)

Grafana Loki: Die nächste Generation des Log-Managements

Platform as a Service vs. Infrastructure as a Service

Teil 6 - Die Architektenrolle in DevOps-Teams/Organisationen

IT-Modernisierung

Migration von HOST-Anwendungen zu AWS: Modernisierung

API Economy & API Management

Interview: Wie Unternehmen Cyber Security herstellen

die Bayerische: Modularisierung und Migration des PoS

SUMIDA: Mobile Datenerfassung in Industrieproduktionsstätten

HUK-COBURG: Modernisierung der Contact-Center-Prozesse

PNW: IBM Lizenzmanagement zum Festpreis

Rodenstock: Moderne Technologien und KI für Beratersoftware

HUK-COBURG: Mit ARS in 90 Tagen in die API Economy

Galuba & Tofote: KI-basierte Marktanalyse-Lösung swarmsoft

tvtv Services setzt auf JEE-Standards und Webservices

Die Highlights der Red Hat Summit Virtual Experience 2020

Trost: Integration von IBM System i mit Webservices

Schufa: Lizenzmanagement und Compliance Audit-Begleitung

Demokratisierung von Softwaretests

AWS Lambda: Erste Schritte mit Java

Eine API kommt selten allein - APIs in der freien Wildbahn

Requirements Engineering oder Business Analyse

CI-Ops vs. GitOps

Roadmap zu digitalen Produkten

Angular 18: Das nächste Kapitel

DynamoDB starten: Einblicke in AWS Key-Value Datenbank 2

So kommt Ordnung in den Infrastructure as Code-Werkzeugkaste

Keine Angst vor Komplexität

Barrierefreiheit richtig umsetzen

Bedeutung von APIs als Interaktionsmodell
