Category: Allgemein
Spying on everyone – Cheap and Simple
Introduction Espionage, or less formally “syping” has become a huge public topic in Summer 2013. Edward Snowden revealed that The American NSA (National Security Agency) and the allied Great Britain GCHQ (Government Communications Headquarters) are surveilling, storing and examing all network traffic in- and outbound the US and Great Britain. The debate covered the Newspapers…
Analyzing text with IBM Watson services on Bluemix
You might have already heard of IBM’s artificial intelligence “Watson”, which beat two former champions of the american television game show “Jeopardy!” back in 2011. What you probably don’t know is that today lots of predefined Watson services are publicy available on IBM’s cloud platform “Bluemix”. These services cover different aspects of AI-backed applications like…
Our moments of AHA
Once again we spent an entire semester rifling through papers trying to learn something from the great ideas and mistakes others did before us. In this post we want to share with you our greatest moments of aha together with the papers that provoked them. How hacking team got hacked – you would think they…
Microservices – Legolizing Software Development III
Security is a topic that always occurs with microservices. We’ll present our solution for managing both, authentication and authorization at one single point.
Snakes exploring Pipelines – A “System Engineering and Management” Project
Part 4: Jenkins and Wrap Up This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. Our first blog entry for this year will at the same time be the final one for this project as well, but to…
Snakes exploring Pipelines – A “System Engineering and Management” Project
Part 3: Coding Guidelines This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. An important part of any professional software development process (like ours 😀 ) are coding guidelines and methodologies, so we’ll deal with these in today’s…
Snakes exploring Pipelines – A “System Engineering and Management” Project
Part 2: Initial Coding This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. Onwards to the fun part: The actual coding! In this blog entry, we will focus on test-driven development. Like we learned in the course, the…
Snakes exploring Pipelines – A “System Engineering and Management” Project
Part 1: Tool Setup This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. Welcome to the next part our project, on its way to become the Snake game with the very best underlying code base ever. (If you…
Snakes exploring Pipelines – A “System Engineering and Management” Project
Part 0: Introduction This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. Once upon a time, which was about one and a half months ago, an illustrious group of three students found together, united by the shared interest…
Secure Systems 2016 – An Overview, Walter Kriha
This is an attempt to provide an overview of the topics in “Secure Systems”, a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite lucky, as some of them…
You must be logged in to post a comment.