A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
Testing a MongoDB with NodeJS, Mocha and Mongoose
Related articles: ►Take Me Home – Project Overview ►CI/CD infrastructure: Choosing and setting up a server with Jenkins as Docker image ►Android SDK and emulator in Docker for testing ►Automated Unit- and GUI-Testing for Android in Jenkins Setting up the testing environment and workflow Setup: Jenkins CI Docker Container MongoDB Docker Container Production-MongoDB on mlab.com NodeJS Web-Application,…
Security in a SaaS startup and today’s security issues with DevOps
Motivation Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and policies and does not even…
Livestreaming with libav* – Tutorial (Part 2)
If you want to create videos using FFmpeg there is a basic pipeline setup to go with. We will first take a short overview over this pipeline and then focus on each individual section.
Vulnerable Vehicles – Connected cars and their security issues
In times of the continuing Internet-of-things- and connectivity-hype, a connected variant of “the German’s favourite toy” cannot be absent. Modern cars, SUVs and lightweight trucks come with all kinds of connected features, from smartphone interface integration up to social media in the navigation system. But what about the security of these features? Is there a…
Usable Security – Users are not your enemy
Introduction Often overlooked, usability turned out to be one of the most important aspects of security. Usable systems enable users to accomplish their goals with increased productivity, less errors and security incidents. And It stills seems to be the exception rather than the rule. When it comes to software, many people believe there is an…
Embedded Security using an ESP32
Ever wondered why your brand-new Philips Hue suddenly starts blinking SOS? Or why there is an ominous Broadcast on your Samsung TV while watching your daily Desperate Housewives? And didn’t you wear an Apple Watch a few minutes ago, and why did you buy 2 TVs in that time? Security of smart and embedded devices…
AIRA Voice Assistant – A proof of Concept in virtual reality
Motivation As part of the lecture “Software Development for Cloud Computing” we were looking for a solution, how a user can get basic assistance within our existing virtual reality game AIRA. The primary objective was a maximum of user-friendliness, while avoiding an interruption of the immersive gaming experience. It is also important to keep in…
Cloud Security – Part 2: The vulnerabilities and threats of the cloud, current scientific work on cloud security, conclusion and outlook
The second of two blog posts about cloud security. This post covers the vulnerabilities and threats of the cloud, the current scientific work on cloud security and a conclusion and an outlook.
Cloud Security – Part 1: A current market overview and the concepts and technologies of the cloud
The first of two blog posts, that are dealing with the latest developments in cloud security. This post covers a current market overview of cloud computing and the concepts and technologies used in the cloud.
VVS-Delay – AI in the Cloud
Introduction Howdy, Geeks! Ever frustrated by public transportation around Stuttgart? Managed to get up early just to find out your train to university or work is delayed… again? Yeah, we all know that! We wondered if we could get around this issue by connecting our alarm clock to some algorithms. So we would never ever…
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Containers Continuous Integration data protection deep learning DevOps distributed systems Docker Games Git gitlab Gitlab CI Google Cloud ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js privacy Python scaling secure systems security serverless social media Terraform Test-Driven Development ULS ultra large scale systems Web Performance
You must be logged in to post a comment.