-
Få indsigt i cybersikkerhed som begreb og en introduktion til nogle af de værktøjer og tilgange, du kan tage i brug allerede i dag for at beskytte dig…
Introduktion til cybersikkerhed - Cybertruslen og…
-
Gagik Amaryan, MongoDBMCPs are meant to be these magical tools that let you integrate the latest and greatest AI models into any service. But when you’re dealing…
Secure MCP Servers in Production: It’s all…
-
Rune Kaagaard, Prescriba Claude Code is surprisingly good at handling large codebases, but only if you teach it properly. This talk covers practical lessons from working…
Claude Code in Practice: Making It Work on Real…
-
Ivan Sanchéz Valencia, CrateDB People often joke that there are more developers building MCP servers than developers using them, and there is some truth in that,…
The model context protocol (MCP). How is it made?
-
At this event, you will get three different perspectives on how the Model Context Protocol is changing the way we build and run AI-integrated systems. From understanding…
MCP in Practice: Building, Using, and Securing…
-
Taylor Banks, a cybersecurity strategist, educator, and builderIn fact, when taken to their extremes, such goals can work against each other. Strong security controls…
Security vs. Privacy: Striking the Balance Before…
-
David Heinemeier Hansson og IDA ITs formand Sidsel Jensen på scenen graver ud live, hvad der skal til for at blive digitalt suværen på den…
Digital suverænitet. En hot samtale
-
Asger Christensen, IT&Oplægget undersøger hvordan ledelse og digital suverænitet bør sammentænkes, og hvilke tiltag man kan…
Digital suverænitet kræver ledelse
-
Oplæg ved Poul-Henning KampWelcome to the Driving-IT DIY channel.Today in Some Assembly Required, we will go through the list of parts required, and how to…
Some Assembly Required: Digital Self Determination
-
Peer Heinlein, Heinlein Support GmbHEurope needs solid answers—and tools people want to use. For years, teams have tried to create credible alternatives to…
We Need Real Answers — Building the…
-
Path to Digital Sovereignty v2 er et framework for beslutningstagere, der har brug for en forankringsplan. Hvordan implementerer vi det forsvarligt med hensyn til…
Path to Digital Sovereignty v2
-
Thomas Visby, LEGOWhen you (yes,you!) learn something new about people or culture or IT, it is often the outcome of someone's research. Getting your attention is…
How do project teams and stakeholders get the…
-
Rolf Molich, Selvstændig konsulent.”Hvorfor er dine meninger om denne brugergrænseflade bedre end mine?” er et kritisk spørgsmål,…
Hvad ville DU gøre?
-
Shannon Mølhave, UX DesignerThis session explores the evolution of the One Design System project at Stibo Systems, contrasting initial vision with real-world…
Balancing Vision and Pragmatism: Lessons from…
-
Anders Schrøder, UX EvangelistAlle vil gerne have bedre brugeroplevelse, men den bliver ofte nedprioriteret. En grund til dette kan være, at den ansvarlige…
Hvordan måler man brugeroplevelsen -…
-
Jørgen Kragh Jakobsen, IC Works Det har aldrig været nemmere og billigere at bygge sin egen chips - Jeg viser hvordan man kommer i gang med det. Chip…
Byg din egen mikrochip med kode agenter
Søg efter ""