Blog

Articles

In our blog, we share useful insights on a wide range of topics related to IT systems, software, and security.

Generative AI in Development - How We Use AI in Ponte's Projects

Over the past two years, the Ponte team has been working intensively on integrating generative AI technologies to make our development processes faster and more efficient. The journey began with the introduc...
Learn more

Building an AI-Powered Online Marketplace in the Emirates

How Are We Shaping the Future of Shopping? Today, most of us click onto an online marketplace when we’re thinking about making a purchase. Maybe we’re not yet sure what exactly we’re looking for, or we simpl...
Learn more

The Role of Color in Defining Corporate Identity

Author: Dul Anita
In the fields of design and branding, color is far more than an aesthetic choice; it is a powerful tool that can influence user behavior, evoke emotions, and enhance brand recognition. For a newly establishe...
Learn more

From Colleagues to Colleagues - A New Dimension of Knowledge Sharing

Author: Fetter Dávid
The technology industry — especially web and mobile development — evolves rapidly. That’s why keeping our colleagues up to date has always been a top priority. But how can we achieve this in a constantly cha...
Learn more
1 234

Knowledge base

We support the development of our colleagues through professional workshops, offering biweekly and monthly lecture series as well.

AWS

Author: Hadobás András
AWS Lambda - developing, configuring, and running cloud-based applications. The presentation shared a developer's perspective on the advantages and disadvantages of AWS. A concrete example illustrated the entire process, and the session concluded with a brief look at other useful related AWS services.

SQL Queries with AI

Author: Farkas Ferenc
Tired of writing SQL scripts manually? Want to work more efficiently and save time? Discover a revolutionary way to generate SQL scripts using AI tools! Let’s make our work smarter and faster!

reCaptcha + Two-Factor Authentication

Author: Domonkos Zoltán
How should we handle an unknown user? Should we let Google decide whether our user is a human or a bot? The session covered using reCaptcha v2 and v3 at DOKK. For additional security on the Workspace side, we also looked at enabling two-factor authentication for users.

Life as a System Administrator + Cloud Deployment

Author: Szűcs Rudolf
What challenges and tasks shape the life of a system administrator? What does a typical day look like? The second part of the presentation offered a brief overview of the Google Cloud environment and a first-hand account of deploying applications to the Cloud.