Category: Allgemein
Bring your own Device – advisible, but often still harmful
(written by Mona Brunner, Maren Gräff and Verena Hofmann) Introduction Bring your own device (BYOD) is a concept which enables employees to use their personal devices for work. The most poplular devices are smartphones and tablets, however, notebooks can also be included as well. Using their own device employees can access their work Emails, calendar…
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – You got cloudified – Part 3
At the beginning of our project we had little experience in “that cloud thing everyone is talking about”. Just like Gary Klinman from Hewlett Packard pointed out, we already knew that it is possible to “back things up to the cloud”, but in our imagination “the cloud” seemed more like a fancy slogan than a…
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – Is it nice to organize?! – Part 2
In every job interview, sooner or later there will be the important question: Can you tell us about your teamwork skills? The importance of teamwork is continuously increasing in the IT world and coding geeks sitting in a dark basement are outdated.

Rust – fast and secure
Rust, a fairly new programming language promises to be fast and secure. The following blog entry discusses how Rust tries to achieve these two goals. The key concept is that every resource always belongs to exactly one variable. More precisely one lifetime, which is normally automatically created on variable creation. The concept of lifetimes would…

IT-Security in film and fiction
Probably everybody with a background in computer science has already seen a hollywood blockbuster or read a critically acclaimed book which alluded IT-security. It is a popular topic which allows to play with the expectations and fears of the audience. Government agencies are hacked within seconds, security failures happen everywhere, destructive malware infects machines on…

The new CI world, Wrapping it up with Git
Nowadays many agile teams work with Git and Feature Branches. A developer works with on a feature and at the end he merges the new feature’s code into the project. However, this concept goes against the principles of CI. Let’s take a closer look at this practice and find out if the concepts of version…
The Elixir Programming Language
An introduction to the language, its main concepts and its potential. The number of security incidents has been on the rise for years, and the growth of the Internet of Things is unlikely to improve the situation. Successful attacks on all kinds of interconnected smart devices, from car locks over home security systems to highly…
Side-channel Attacks
This post will give you an introduction to Side-channel Attacks by looking at some common vulnerabilities and concrete attacks that try to exploit those. But first: What actually is a Side-channel attack in general? A Side-channel Attack is an attack on a system, most probably a “secure” system, that does extract secret data by using…
Jenkbird – Wrap up & seeing the bigger picture – Part 5
Kchhhhhh, Kchhhhhh, Kchhhhhhh… – Ernie on companies without CI Hello internet and welcome to the last part of our tutorial series about Continuous Integration, Code Deployment and Automated Testing with Jenkins. If you arrived at this post and have read all the others we are very proud of you, hope you enjoyed the journey and learned something…
Jenkbird – Quality & Testing – Part 4
Love and testing can be cruel. – Bert on the difficulties in life Quality and Testing – one of the most discussed and valuable topics software engineering has to offer. This blog post will cover all the relevant stuff related to quality and testing in regard to Continuous Integration and Jenkins. We will show you in detail, how you…

You must be logged in to post a comment.