A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
Evaluating and Visualizing Statistical Bot Data
The idea Video game streaming has taken over a big part of the commercial video game scene with Twitch being its biggest platform. Viewers are able to communicate with other viewers and streamers through the chat, or watch their previous streams or highlights. These highlights are made by streamers creating short clips of their favourite…
Production Monitoring – Industry 4.0
When I was invited to a design thinking workshop of the summer school of Lucerne – University of Applied Sciences and Arts, I made my first experience with the end user interaction part of Industry 4.0. It was an awesome week with a lot of great people and made me interested in the whole Industry…

JavaScript Performance optimization with respect to the upcoming WebAssembly standard
Written by Tim Tenckhoff – tt031 | Computer Science and Media 1. Introduction Speed and performance of the (worldwide) web advanced considerably over the last decades. With the development of sites more heavily reliant on JavaScript (JS Optimization, 2018) , the consideration of actions to optimize the speed and performance of web applications grows in…
How to create and integrate a customised classifier based on IBM Visual Recognition
Helga Schwaighofer – hs082 Celine Wichmann – cw089 Lea Baumgärtner – lb092 Motivation Imagine you are having a bad day, but you don’t know what to do. Your friends are not available, but you’d like to have advice depending on your mood. For that case, we created the Supporting Shellfish! This service generates advice based…
Mobile Security – How secure are our daily used devices?
Nowadays, the usage of mobile devices has become a part of our everyday life. A lot of sensitive and personal data is stored on these devices, which makes them more attractive targets for attackers. Also, many companies offer the possibility to work remotely, which results in storing confidential business information on private phones and therefore…
Single Page Web Applications
(Originally written for for 143206a Entwicklung von Rich Media Systemen in 07/2019) Intro There are two fundamentally different concepts in web application development: Single-Page and Multi-Page architectures. This article explores the different approaches and explains some of the development concerns of single page architectures, at the example of how to handle the browser history, search…
Crypto-Trading: Securing Million Worth API-Keys in a Distributed System
The teaching of IT security is often about trust boundaries – these are drawn at the interface of the system to the outside world. While this view is dangerous even with a monolithic system, it is simply wrong with a distributed system. Especially when the system’s data is so delicate that you don’t even want…
How to create a K8s cluster with custom nodes in Rancher
Don’t you find it annoying not to be able to manage all your Kubernetes clusters at a glance? Ranger 2.0 offers an ideal solution. The following article is less a scientific post than a how-to guide to creating a new Kubernetes cluster with custom nodes in Ranger 2.0. But before we drift into the practical…
How internet giants deliver their data to the world
In the course of attending the lecture “Ultra Large Scale Systems” I was intrigued by the subject of traffic load balancing in ultra-large-scale systems. Out of this large topic I decided to look at traffic distribution at the frontend in detail and held a presentation about it as part of this lecture. As this subject…
Consensus protocols – A key to cluster management?
blogpost In these times, applications require increasing robustness and scalability, since otherwise they will collapse under the burden of the vast number of users. Cluster managers like kubernetes, Nomad or Apache Marathon are a central factor of this resilience and scalability. A closer look at the insides of cluster managers reveals consensus protocols to be…
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Cloud Computing Containers Continuous Integration deep learning DevOps distributed systems Docker Enterprise IT Git gitlab Gitlab CI ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js Python scaling secure systems security serverless social media Sustainability System Engineering and Management Terraform Test-Driven Development ULS ultra large scale systems Web Performance

You must be logged in to post a comment.