Blog

circles
NEW!
circles

Kubernetes – what is orchestration and why Docker is not enough?

Discover what Kubernetes is, its fundamental capabilities, and why Docker alone might not be enough for serious production environments.

Programming

NEW!
circles

Neural Networks Training with Limited Resources

Neural networks and their training on graphics processing units (GPUs). Learn why GPUs are becoming a popular choice.

Information

Innovation

NEW!
circles

CI/CD, SDLC, and other concepts in the DevOps culture

Learn how introducing CI/CD increases the efficiency of teams and the frequency and quality of your company's software deployments.

Programming

NEW!
circles

IT Strategic Analysis

Odkryj proces analizy strategicznej w obszarze IT: definiowanie celów, strategii, konkurencji i potrzeb klientów.

Strategy

NEW!
circles

Organization of the IT technology transfer process in the enterprise

The IT technology transfer process: planning, implementation, evaluation - key phases in business challenges and successes.

Strategy

NEW!
circles

Types of IT technology strategies

Overview of possible approaches and challenges when optimising IT strategy - types of technology strategies.

Strategy

NEW!
circles

Docker – Do It Right and Securely Part 2

Another portion of good practice in containerisation using Docker software.

Administration

NEW!
circles

Docker – Do It Right and Securely Part 1

Discover Docker best practices: official images, versioning, image minimisation, multi-stage build and more!

Administration

NEW!
circles

SDLC and DevOps Culture

Analysis of the impact of DevOps on the software development process, differences from traditional methods and integration in different stages of the software development lifecycle.

Programming

NEW!
circles

Linux – About Shells, Scripts, and Permissions

Discover the world of Linux, learn the differences between shells, how to create bash scripts, and the secrets of granting permissions on the system.

Administration

NEW!
circles

Internet of Things (IoT) – Part 4: CoAP protocol

Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.

Information

NEW!
circles

INNOKREA recognized as a Top Development Company in 2024 by Techreviewer.co

We are delighted to have been recognized as one of the top software development companies in 2024.

Information

NEW!
circles

Internet Of Things (IoT) – Part 3

IOT - available technologies, software packages and what are the differences between the protocols specific to IOT?

Information

NEW!
circles

Internet Of Things (IoT) – Part 2

Technical aspects of the operation of Internet of Things (IOT) devices, protocol stacks and challenges that engineers have to face.

Information

NEW!
circles

Internet Of Things (IoT) – part 1

IOT - how rapidly the number of devices on the Internet is growing and how the number of sensors we use directly or indirectly is increasing.

Information

NEW!
circles

Machine Learning – Part 3: Data Representation Methods

Several widely used data representation methods - how to effectively transfer data to the data processing algorithm.

Information

NEW!
circles

Machine Learning – Part 2: Different Approaches

About the approaches used in this field, their advantages and disadvantages, as well as possible applications of some algorithms.

Information

NEW!
circles

Machine Learning – Part 1: Is It Worth It?

Machine learning is a field that is developing at an incredible pace and is penetrating virtually all sectors of the economy.

Information

NEW!
circles

Cryptography – stream ciphers

Low-level operation of encryption algorithms - what are LSFR registers and where stream ciphers are used.

Security

NEW!
circles

Cryptography – good password and good practices

About storing, saving and password policy.

Security

NEW!
circles

Cryptography – hash functions, hashes and passwords part 2

Passwords and their security on the Internet.

Security

NEW!
circles

Cryptography – hash functions and passwords

Cryptography - discover the secrets of hash functions, hashes and passwords.

Security

NEW!
circles

Cryptography – randomness in cybersecurity

What is randomness, how to properly estimate it, and how important is it in the field of cryptography.

Security

NEW!
circles

Cryptography – basic concepts and definitions

Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series

Security

NEW!
circles

Authentication, Second Factor, and Session Hijacking

What is authentication, what is the second factor and what options do we have to confirm the user's identity

Security

NEW!
circles

Virtualization and containerization – good design principles

Virtualization, its types and good design principles for containers.

Programming

NEW!
circles

Ransomware – What It Is and How It Can Impact Your Company ? (part 2)

Real cases of attacks and good defense practices in cyberspace

Security

NEW!
circles

Ransomware – What It Is and How It Can Impact Your Company ?

Threats and good practices for counteracting ransomware

Security

NEW!
circles

Compilation vs. Interpretation (part 3)

Disadvantages of compiled languages and how interpreters respond to modern needs

Programming

NEW!
circles

Compilation vs. Interpretation (part 2)

File formats, and the low-level aspects related to assembly language and processor architecture

Programming

NEW!
circles

Compilation vs. Interpretation (part 1)

Understanding differences and similarities of code compilation and interpretation

Programming

NEW!
circles

Terraform – Infrastructure Management Automation (part 2)

The basics of managing state in Terraform and setting up a Github repository

Administration

NEW!
circles

Terraform – Infrastructure Management Automation (part 1)

Fundamentals of infrastructure automation with Terraform

Administration

NEW!
circles

Improve your online security with Innokrea – don’t let yourself be robbed (part 4)

The last episode of the cybersecurity series

Security

NEW!
circles

Enhance your online safety with Innokrea – don’t let yourself be robbed (part 3)

Tips #21 - #30 on cybersecurity

Security

NEW!
circles

Increase your Internet security with Innokrea – don’t let yourself be robbed (part 2)

Tips #11 - #20 to increase your safety on the Internet

Security

NEW!
circles

Increase your online security with Innokrea – don’t let yourself get robbed (part 1)

10 tips that will increase your online security

Security

NEW!
circles

Supercomputers (part 4)

Ways to increase the efficiency of supercomputers

Innovation

NEW!
circles

Supercomputers (part 3)

Network architecture of cluster systems and network topologies

Innovation

NEW!
circles

Top 100 iOS Development Companies 2023

INNOKREA Included in Techreviewer's Top 100 iOS Development Companies for 2023

Information

NEW!
circles

Supercomputers (part 2)

Technologies and cooling of supercomputers

Innovation

NEW!
circles

Supercomputers (part 1)

Introduction to the topic of supercomputers

Innovation

NEW!
circles

Masscan (part 2)

Specifics, advanced options and reflection attack.

Security

NEW!
circles

Masscan (part 1)

How to scan the entire Internet in minutes?

Security

NEW!
circles

SOLID – clean code in object-oriented programming

Descrption of rules for object-oriented programming

Programming

NEW!
circles

Clean code

How to write safe, high-quality code ?

Programming

Security

NEW!
circles

Hannover Messe 2023

Report on the participation of INNOKREA in the fair

Information

Innovation

NEW!
circles

Docker – how to simplify running and deploying applications ? (part 4)

Differences between ARG and ENV, docker-compose, orchestration and docker API

Administration

NEW!
circles

Docker – how to simplify running and deploying applications ? (part 3)

We present the basic problems that a novice Docker user may encounter

Administration

NEW!
circles

Docker – how to simplify running and deploying applications ? (part 2)

Basic Docker commands

Administration

NEW!
circles

Docker – how to simplify running and deploying applications ? (part 1)

We present the subject of virtualization, containerization and Docker.

Administration

NEW!
circles

Zabbix – Increase security, monitor your servers (part 3)

Description of the admin panel and selected problems with database monitoring in Zabbix

Administration

Security

NEW!
circles

Zabbix – Increase security, monitor your servers (part 2)

Ways to configure Zabbix software

Administration

Security

NEW!
circles

Zabbix – Increase security, monitor your servers (part 1)

Article about the popular server management tool

Administration

Security

NEW!
circles

What is BadUSB and why can it be a vector of an attack on your company? Part 2

How to protect a company against attacks through Rubber Ducky devices?

Security

NEW!
circles

What is BadUSB and why can it be a vector of an attack on your company? Part 1

How an inconspicuous flash drive can lead to taking control of your computers?

Security

NEW!
circles

IT technology replacement

The most important questions that need to be answered before replacing an IT technology.

Management

Strategy

NEW!
circles

Evaluation of IT strategy

Every IT strategy (even the best one) requires periodic review and reflection

Strategy

NEW!
circles

Deloitte Technology Fast 50 CE 2022

We are delighted to have been recognized in Deloitte's prestigious ranking as the fastest growing technology company in Central Europe. 

Information

NEW!
circles

How to optimize business processes using the process mapping method?

In this article, you will learn how to optimize your business processes using the process mapping method to increase the efficiency.  

Management

Strategy

NEW!
circles

Digitization of company processes – what is worth knowing?

Digitization of processes involves bringing technological solutions into a company and enables it to keep pace with changes in the economy. 

Strategy

NEW!
circles

Pros and cons of digitization in manufacturing processes

Digitization of production processes has become one of the most important trends in the manufacturing industry. Learn about the pros and cons of digitization.

Strategy

NEW!
circles

Industry 4.0 and its impact on manufacturing companies

Industry 4.0 What impact does digitization have on manufacturing companies? What opportunities do digital technologies offer? What are the benefits of the digital revolution?

Management

NEW!
circles

How to increase operational efficiency in a manufacturing company?

What changes have occurred over the past few years?  How do you create value with BPM? How does BPM improve operational efficiency in manufacturing companies? 

Innovation

NEW!
circles

The Manifest Names Innokrea Among Poland’s Most Reviewed Software Developers

INNOKREA among top development companies in Poland

Information

NEW!
circles

Evaluation of IT projects

How to know if our projects are going in the right direction and will achieve their goals?

Management

NEW!
circles

Main challenges and risks of IT projects

Proper and pragmatic risk management can save a lot of money

Management

NEW!
circles

The impact of implementations of IT projects on the company’s production processes

IT project implementation might be challenging. It is important to take into considerations potential impact of the deployment on all business processes.

Innovation

Strategy

NEW!
circles

Planning of IT projects – constraints

Imagine an IT project without any constraints ?

Innovation

NEW!
circles

Planning of IT projects – smart goals

“If one does not know to which port one is sailing, no wind is favourable.” — Seneca

Strategy

NEW!
circles

Planning and selection of technologies – Assessment of investments in IT technology

How to assess the financial effectiveness of investments in IT technology ?

Financial

NEW!
circles

Planning and selection of IT technologies – readiness and ability to absorb it in a company

When considering the transfer of a given IT technology to a company, we should take into account its readiness and the company's ability to absorb it.

Strategy

NEW!
circles

Planning and selection of IT technologies in companies

General principles of technology selection

Strategy

NEW!
circles

Methods of creating an IT technological strategy

A key instrument for developing a targeted technological strategy (including IT) is to define its goals.

Strategy

NEW!
circles

The concept and formulation of a technological strategy

A competitive advantage might be built by mastering many different technologies. That process requires strategic analysis, choice, planning and implementation.

Strategy

NEW!
circles

Strategic conditions for the development of IT technology

Business strategy and IT strategy must be united to conquer targeted markets.

Strategy

NEW!
circles

Sources of IT technologies

Enterprises interested in building a competitive advantage on the market through technology development can use internal, external and/or combined sources. Which model suits the best your company ?

Strategy

NEW!
circles

Trajectories of Technological Development

IT technologies, like other technologies and products of human thought and work, in different periods of their existence have different meanings and value for their users.

Innovation