[written by Roman Kollatschny and Matthias Schmidt]
Welcome back to our fourth and final post in our series. This time we want to deal with code style and code quality to optimize coding on additional ways.
[written by Roman Kollatschny and Matthias Schmidt]
Welcome back to our fourth and final post in our series. This time we want to deal with code style and code quality to optimize coding on additional ways.
Looking back at 4 months of intensive work on our project “SocialCloud” we gathered a lot of experiences and learned many things regarding teamwork, cloud infrastructure and about the difficulties of creating and designing a web application from scratch.
Read this blogpost to be prepared for your next big project!
Locally organized voluntary groups, helping refugees manage their first steps in Germany, are often organized by mass-email with up to 50 recipients. So the huge amount of received emails which should be clarified ends up in a “answer all”-flood of every involved mailbox. Another realistic misbehaviour is that images are sent uncompressed as attachment, so some recipient mailbox exceed their limitation of 25MB per mail. Continue reading
[written by Roman Kollatschny and Matthias Schmidt]
Uhwe, hello and welcome back to the third of our posts in this series. Today we want to show you additional features and tipps on developing a node.js web application test driven. As stated in the last article we use Mocha.js and Chai.js as tools.
One of the requirements of the system is that organizations should be able to set up and deploy the HumHub system on their own. For this purpose, we have designed the Configtool. To meet this requirement we have to use different tools, procedures and interfaces from Bluemix. In the following we would like to introduce some of them.
Sadly today’s security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a “rule set” to detect and prevent any attack. This “analyst-driven solutions” are build up from human experts with their domain knowledge. This knowledge is based on experiences and build for attacks of the past. But if any attack don’t match the rules, the secure system don’t recognizes it and the security is broken.
The question is: Is there a possibility to train a model based on past attacks to predict further attacks?
Cloud computing has so much potential that the possibilities seem to be endless. Without knowing much about it the cloud looks like a magic place for many people.
To give you a more detailed explanation we sum up the design process of our cloud application step by step in the following blog post. Without giving too much away, it can be said that we still put our trousers on one leg at a time ;-).
(written by Mona Brunner, Maren Gräff and Verena Hofmann)
Introduction
Bring your own device (BYOD) is a concept which enables employees to use their personal devices for work. The most poplular devices are smartphones and tablets, however, notebooks can also be included as well. Using their own device employees can access their work Emails, calendar as well as other company data on their own devices.
Continue reading
‘To Start Press Any Key.’ Where’s the ANY key?
– Homer Simpson –
There are so many possibilities to start the next big thing and the great thing in the IT- world is, that it is happening with every pressing of ‘any key’ on your Keyboard. So, press these keys and realize great and new ideas.
But there is a problem … TIME.
At the beginning of our project we had little experience in “that cloud thing everyone is talking about”. Just like Gary Klinman from Hewlett Packard pointed out, we already knew that it is possible to “back things up to the cloud”, but in our imagination “the cloud” seemed more like a fancy slogan than a clear technical concept of providing data and processing resources. Continue reading
You must be logged in to post a comment.