Guest series: Agile IT Supplier Management

black-collaboration-cooperation-943630
Today we start a new series on agile IT supplier management. Agile Supplier Management? Isn't supplier management a dust-dry topic with endless contract negotiations, which has exactly zero to do with agility? Our guest blogger Marcel Teichert, himself IT Supplier Manager at a global corporation, will explain in this and the next articles how he be...
Continue reading

Gastreihe: Agiles IT Supplier Management

black-collaboration-cooperation-943630
Heute starten wir eine neue Serie zum Thema Agiles IT Supplier Management. Agiles Supplier Management? Ist Supplier Management nicht ein staubtrockenes Thema mit endlosen Vertragsverhandlungen, welches genau Null mit Agilität zu tun hat? Unser Gastblogger Marcel Teichert, selbst IT Supplier Manager bei einem weltweit agierenden Konzern, wird uns in...
Continue reading

Two years of TEAL: We are different - we grow fast - we are successful - it is fun!

2years
  24 months after the foundation of TEAL, it's time to draw an interim balance and say THANK YOU. Thanks to our customers and thanks to our team. It's really fun with you! In the last two years we have implemented exciting and challenging projects with our customers. Trusting and long-term customer relationships with enterprise and DAX groups ...
Continue reading

Zwei Jahre TEAL: Wir sind anders – wir wachsen schnell – wir sind erfolgreich – es macht Spaß!

2years
24 Monate nach der Gründung von TEAL heißt es, eine Zwischenbilanz zu ziehen und einmal DANKE zu sagen. Danke an unsere Kunden und danke an unser Team. Es macht wirklich Spaß mit Euch! In den letzten zwei Jahren haben wir spannende und fordernde Projekte mit unseren Kunden umgesetzt. Vertrauensvolle und langfristige Kundenverhältnisse mit Enterpris...
Continue reading

ESAE Series Part 5 - Windows IPSec

cyber-security-600_360
Welcome to the fifth part of our ESAE series. In this part, we would like to focus on an area that is not covered so comprehensively on the Internet - Windows IPSec. What is IPSec? "IPsec (short for Internet Protocol Security) is a protocol suite designed to enable secure communication over potentially insecure IP networks such as the Internet. IPs...
Continue reading

ESAE Serie Teil 5 - Windows IPSec

cyber-security-600_360
Herzlich willkommen zum fünften Teil unserer ESAE Serie. In diesem Teil möchten wir uns gerne auf einen im Internet nicht so umfassend behandelten Bereich konzentrieren – Windows IPSec. Was ist IPSec? „IPsec (Kurzform für Internet Protocol Security) ist eine Protokoll-Suite, die eine gesicherte Kommunikation über potentiell unsichere IP-Netze wie d...
Continue reading

Openshift - Automated Installation in Azure

hamburg-3021820_640
We deliberately do without an introductory article about the importance of OpenShift and the advantages over a native Cubernet installation. There are enough articles about this on the net and Red Hat also writes about it: https://www.openshift.com/learn/topics/kubernetes/ Anyone who has ever needed a high-available Openshift installation for tests...
Continue reading

Openshift - Automatisierte Installation in Azure

hamburg-3021820_1280
Auf einen Einführungsartikel über die Bedeutung von OpenShift und den Vorteilen gegenüber einer nativen Kubernetes Installation verzichten wir bewusst. Dazu gibt es genügend Artikel im Netz und auch Red Hat schreibt dazu: https://www.openshift.com/learn/topics/kubernetes/ Alle, die schon mal für Tests oder Demos eine hochverfügbare Openshift Instal...
Continue reading

Provider Management in the context of out-tasking - A report from the field

play-2882474_640
IT out-tasking is still a popular tool in IT management. As this form of outsourcing is often used, we would like to share our experience with you. In these articles we try to reflect practical experience from a general point of view, less the classical theory of outsourcing or out-tasking. Our articles are based on the illustrated cycle. It is imp...
Continue reading

Naked TEAL - For you! - With you! - Be there!

naked_teal
We are TEAL, a young start-up doing system integration. And we want to embark on a unique journey with you, our fans, followers, friends, readers, future employees, editors and many, many more from the community who may not even know us today: The journey to the first virtual IT consulting company in Germany Our goal: We want to become a maximum at...
Continue reading

Can I really convert any application into a container and how?

hamburg-3021820_640
In our first two container articles, we talked about the architecture and the deployment of container solutions. We'd now like to tackle the topic of application transformation. This article was written together with our partner company – Skillbyte . Skillbyte provides services in the areas of DevOps & Cloud, Big Data and Analytics, as well as ...
Continue reading

ESAE series part 4 – Protective measures for the environment

cyber-security-600_360
In this part of the series, we would like to reiterate the requirements from part 2 ( Link ) and demonstrate which measures have been taken to protect the critical systems. However, before we start off with the requirements, there needs to be clarity over which systems are classified as tier 0, tier 1 and tier 2. This definition may vary depending ...
Continue reading

ESAE series part 3 - Privileged access management and the shadow principal feature

cyber-security-600_360
As already announced in the last article ( LINK ) of the ESAE series, in this article we would like to give you a more in-depth description of the technical core of the ESAE-oriented environment which makes the just-in-time administration possible. This core consists of the shadow principals, temporary group memberships and the new Microsoft I...
Continue reading

Hybrid Container deployment with Jenkins

loading-652296_640
After having written about the architecture of a modern container platform in general in our first blog article ( LINK ), we would like to delve deeper into the praxis with this article. We'll describe a technical solution that helps companies to comply with a wide range of legal requirements while remaining flexible and cost-effective. Strict requ...
Continue reading

Container - How does a modern enterprise container environment look like?

hamburg-3021820_640
When the trend towards virtualisation arose, many companies were sceptical at first. In modernisation projects, operations teams and stakeholders still had to be convinced that applications could be deployed on virtual servers, eliminating the need for dedicated servers. Over time and with increasing operational experience, however, the starting po...
Continue reading

ESAE series part 2 – Customer situation and architecture

cyber-security-600_360
As announced in our introductory article on the ESAE series, we would like to elaborate on the client situation and the architecture of the solution in the second article. Despite the client being represented in numerous countries worldwide, the individual national companies worked predominantly self-sufficiently in the past. There were only very f...
Continue reading

ESAE series part 1- Introduction

cyber-security-600_360
In the blog category "Secure Administration Environment" we want to share our experiences from customer projects around Microsoft's Enhanced Security Administration Environment (ESAE), so that others can learn from our experiences and not stumble across the same problems as we did. We will start with a series on a very exciting topic that we have b...
Continue reading

Teal Blog

home-office-336373_1920
As an IT consulting company specializing in infrastructure and cloud technologies, we were able to gain a lot of experience in the planning and implementation of IT projects for major clients. Through our blog, we want to pass on the acquired knowledge in order to allow as many people as possible to participate in our experiences. We will start wit...
Continue reading

Provider Management im Rahmen von Outtasking – Ein Bericht aus der Praxis

providermanagement
IT-Outtasking ist immer noch ein beliebtes Werkzeug im IT Management. Da diese Form des Outsourcings häufig genutzt wird, möchten wir mit Euch unsere Erfahrungen teilen. Wir versuchen in diesen Artikeln Praxiserfahrungen aus einer allgemeinen Sichtweise zu spiegeln, weniger die klassische Theorie beim Outsourcing oder Outtasking. Wir orientieren un...
Continue reading

Naked TEAL - Für Euch! – Mit Euch! – Seid dabei!

naked_tea_20181129-130510_1
Wir sind TEAL, ein junges Start-up aus der Systemintegration. Und wir wollen uns mit Euch, unseren Fans, Followern, Freunden, Lesern, künftigen Mitarbeitern, Redakteuren und vielen, vielen mehr aus der Community, die uns heute vielleicht noch gar nicht kennen, auf eine einzigartige Reise begeben: Die Reise zur ersten virtuellen IT-Beratung in Deuts...
Continue reading