A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
Stromnetze
Strom wird für fast alles benötigt. Von Computern und Servern, welche ausfallsicher laufen sollen um den Nutzern zuverlässig ihren Service bieten zu können, bis hin zu Wasserpumpen und Medizinischen Geräten, die die Grundversorgung bereitstellen und das Überleben sichern – ein Ausfall dieser Infrastruktur ist daher sehr ungünstig. In diesem Beitrag geht es um mehrere Aspekte…
Finding the right strategy for your way to the cloud
– Abstract – This article is about finding the right strategy if you want to empower your business with cloud computing. It’s written for those of you who are still new to this topic and want to get a first sight through the dense cloud mystery. After reading you should have gained an orientation on…
Fake news with reference to information warfare
Through networking and the Internet, more and more people can share their opinions and spread news. This has positive and negative consequences. On the one hand, it is much easier to get the news you want and to publish it. On the other hand it is relatively easy to influence other users. An insight into…
Corona Warning App
In 2020 many things are different. People work and study from home, wear face masks and are facing restrictions in their fundamental rights. These measures and restrictions were taken to bring the global pandemic under control. More than 800.000 people have died as a result of Covid-19 (SARS-CoV-2) (25.08.2020). “Let’s build an app for it”…
The financial system
Everyone interacts with it, often on a daily basis, everyone is part of it and everyone will suffer from the consequences of a crisis hitting the system, but only few reap the benefits. The financial system has become huge and ominous, it is hard to understand how it works or even fully comprehend it. This…
The Dark Side of AI – Part 2: Adversarial Attacks
Find out how AI may become an attack vector! Could an attacker use your models against your? Also, what’s the worst that could happen? Welcome to the domain of adversarial AI!
The Dark Side of AI – Part 1: Cyberattacks and Deepfakes
Introduction Who hasn’t seen a cinema production in which an AI-based robot threatens individual people or the entire human race? It is in the stars when or if such a technology can really be developed. With this series of blog entries we want to point out that AI does not need robots to cause damage.…
GDPR and Information Security: A practical guide for Startups and small businesses
Let me start with a story. My first contact with GDPR (general data protection regulation) and the topic of information security was during my bachelor throughout an app project. We had set ourselves the goal of uploading the app to Google Play Store by the end of the semester and were thus inevitably confronted with…
IoT security – The current situation, “best practices” and how these should be applied
Smart thermostats, lamps, sockets, and many other devices are no longer part of any futuristic movies. These items can be found in most households, at least in parts, whether in Europe, America, or Asia. A trend that affects the entire globe and is currently gaining ground, especially in industrialized countries. It seems to be obvious…
E-Health in Deutschland: Die neue Elektronische Patientenakte
Anfang 2021 soll die elektronische Patientenakte (ePA) starten. Damit wird es möglich sein, alle Gesundheitsdaten (Befunde, Diagnosen, Behandlungsmaßnahmen, Arztbriefe, etc.) zentral zu speichern. Patienten bekommen so einen zentralen Überblick über all ihre bei verschiedenen Ärzten erfassten Daten, und sind in der Lage, diese Informationen mit bestimmten Ärzten zu teilen. So wird der Datenaustausch zwischen Ärzten,…
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Containers Continuous Integration data protection deep learning DevOps distributed systems Docker Games Git gitlab Gitlab CI Google Cloud ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js privacy Python scaling secure systems security serverless social media Terraform Test-Driven Development ULS ultra large scale systems Web Performance
You must be logged in to post a comment.