Category: Allgemein

Machine Learning in secure systems
Sadly today’s security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a “rule set” to detect and prevent any attack. This “analyst-driven solutions” are build up from human experts with their domain knowledge. This knowledge is based on experiences and build for attacks of the…
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – Cloudy this morning … and we’re scaling – Part 5
Cloud computing has so much potential that the possibilities seem to be endless. Without knowing much about it the cloud looks like a magic place for many people. To give you a more detailed explanation we sum up the design process of our cloud application step by step in the following blog post. Without giving…
Bring your own Device – advisible, but often still harmful
(written by Mona Brunner, Maren Gräff and Verena Hofmann) Introduction Bring your own device (BYOD) is a concept which enables employees to use their personal devices for work. The most poplular devices are smartphones and tablets, however, notebooks can also be included as well. Using their own device employees can access their work Emails, calendar…
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – You got cloudified – Part 3
At the beginning of our project we had little experience in “that cloud thing everyone is talking about”. Just like Gary Klinman from Hewlett Packard pointed out, we already knew that it is possible to “back things up to the cloud”, but in our imagination “the cloud” seemed more like a fancy slogan than a…
- Allgemein, Cloud Technologies, Scalable Systems, Student Projects, System Designs, System Engineering
SocialCloud – Is it nice to organize?! – Part 2
In every job interview, sooner or later there will be the important question: Can you tell us about your teamwork skills? The importance of teamwork is continuously increasing in the IT world and coding geeks sitting in a dark basement are outdated.

Rust – fast and secure
Rust, a fairly new programming language promises to be fast and secure. The following blog entry discusses how Rust tries to achieve these two goals. The key concept is that every resource always belongs to exactly one variable. More precisely one lifetime, which is normally automatically created on variable creation. The concept of lifetimes would…

IT-Security in film and fiction
Probably everybody with a background in computer science has already seen a hollywood blockbuster or read a critically acclaimed book which alluded IT-security. It is a popular topic which allows to play with the expectations and fears of the audience. Government agencies are hacked within seconds, security failures happen everywhere, destructive malware infects machines on…

The new CI world, Wrapping it up with Git
Nowadays many agile teams work with Git and Feature Branches. A developer works with on a feature and at the end he merges the new feature’s code into the project. However, this concept goes against the principles of CI. Let’s take a closer look at this practice and find out if the concepts of version…
The Elixir Programming Language
An introduction to the language, its main concepts and its potential. The number of security incidents has been on the rise for years, and the growth of the Internet of Things is unlikely to improve the situation. Successful attacks on all kinds of interconnected smart devices, from car locks over home security systems to highly…
Side-channel Attacks
This post will give you an introduction to Side-channel Attacks by looking at some common vulnerabilities and concrete attacks that try to exploit those. But first: What actually is a Side-channel attack in general? A Side-channel Attack is an attack on a system, most probably a “secure” system, that does extract secret data by using…

You must be logged in to post a comment.