Category: System Designs
Why system monitoring is important and how we approached it
Introduction Imagine building a service that aims to generate as much user traffic as possible to be as profitable as possible. The infrastructure of your service usually includes some kind of backend, a server and other frameworks. One day, something is not working as it should and you can’t seem to find out why. You…
Combining zerolog & Loki
Publish zerolog events to Loki in just a few lines of code.
- Allgemein, Student Projects, System Architecture, System Designs, System Engineering, Teaching and Learning
Using Keycloak as IAM for our hosting provider service
Discover how Keycloak can revolutionize your IAM strategy and propel your projects to new heights of security and efficiency.
Cybersecurity Breaches
Sicherheitsrisiken im digitalen Zeitalter: Eine Analyse aktueller Cyberangriffe und ihre Implikationen Data Breaches sind eine zunehmende Bedrohung, bei der Hacker und Cyberkriminelle weltweit nach Möglichkeiten suchen, sensible Informationen zu stehlen. Die Motive für solche Angriffe umfassen finanzielle Gewinne, Prestige und Spionage. Laut dem Verizon Report von 2023 machen technische Schwachstellen nur etwa 8% aller Angriffsmethoden…
- Allgemein, Cloud Technologies, Databases, System Architecture, System Designs, Teaching and Learning, Web Performance
Cost-Efficient Server Structure: Merging Static and Dynamic API
While developing our guessing game, “More or Less”, we found a method to significantly reduce traffic on our serverless API, leading to cost savings and an improved content creation experience. The Problem In our game, players can contribute their own game modes, using the web editor. Additionally, we develop game modes ourselves to guarantee high-quality…
- Allgemein, Cloud Technologies, Databases, Scalable Systems, System Architecture, System Designs, Teaching and Learning, Web Performance
Optimizing List Views: Structuring Data Efficiently in Firestore
While developing our guessing game “More or Less”, we encountered a common challenge many developers face: determining the structure of our data model. Challenge 1: List vs. Detailed View Many websites show an excerpt of their content in a list view. In our “More or Less” game, for example, we see a series of game…
The Impact of Quantum Computing on Cybersecurity
The future has arrived: Welcome to the second quantum revolution. But what does this mean for Cybersecurity?
Browser Session Hijacking
This article outlines the dangers of insufficiently protected browser session cookies, how they work, how they can be hijacked and what to do to avoid it.
Usability in Code an Overview from IDE to AI
Wenn man über Usability Kontext von IT redet, wird ein integraler Part gerne komplett übersehen: Den Entwickler.Wie soll Usability richtig umgesetzt werden wenn, der der Beides umsetzten, muss von beiden Themen während seiner Arbeit nichts mitbekommt?Warum hört Usability immer dort auf, wo der Entwickler auf sein Handwerkszeug schaut? Die Fragen oben sind natürlich etwas überspitzt,…
- Allgemein, Artificial Intelligence, ChatGPT and Language Models, Ethics of Computer Science, Secure Systems
Brechen der Grenzen: ChatGPT von den Fesseln der Moral befreien
Abb. 1: Hacking-Katze, die dabei ist, ChatGPT zu jailbreaken, Darstellung KI-generiert “Ich würde lügen, würde ich behaupten, dass kein Chatbot bei der Erstellung dieses Blogeintrags psychischen Schaden erlitten hat” – Anonymes Zitat eines*r CSM-Studierenden 1 Einleitung 1.1 Bedeutung des Themas und Relevanz in der heutigen digitalen Welt Seit 2020 das Large Language Model (LLM) GPT-3…