A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
Predictive Policing – eine kritisch-negative Vorhersage
In diesem Blogpost möchte ich auf die Gefahren, die Predictive Policing verursachen könnte, eingehen wenn es als wissenschaftlich fundiert angesehen und bedenkenlos eingesetzt wird. Predictive Policing bedeutet ‘vorausschauende Polizeiarbeit’ und ist nicht erst seit dem Zehn-Punkte-Plan von Martin Schulz und der SPD ein beliebtes Buzzword im Zusammenhang mit Wohnungseinbrüchen. Dabei wird versucht, bei Delikten Muster…
Human Error in IT failures
With the ever-increasing complexity of artificial systems that aid humans in their daily and work lives, their operation procedures have grown more complicated and the potential for mishandling is higher than ever before. In the IT world, modern systems that must serve hundreds of millions of customers simultaneously and reliably have grown so complex that…
Setup your own Google Home with custom Hotwords
In this article, I will show you how to setup your own Google Home on your Raspberry Pi or any other Linux computer. Further, I will teach you how can create own triggers and hotwords for your assistant.
Build a Serverless Google Home App
In this blog article, I want to show you how to build your own Google Voice app. For Natural language processing, we will use API.AI. Our backend will run on a Google Cloud function, also called serverless functions, written in nodejs.
Dapp Development on Ethereum
In this blog entry we take a look at how to develop a Dapp (‘decentralized app’) on the Ethereum blockchain network and enhance our development process through Gitlab’s continuous integration (CI) services. It is part of the examination for the lecture “Software Development for Cloud Computing”. First, all the necessary technologies to develop a Dapp…
How to fix your HdM VPN config for OpenVPN 2.4.3
The latest OpenVPN 2.4.3 release shipped with some technically minor changes which however might break your config for the HdM VPN in Linux (possibily also applies to MS Windows and Mac OS) due to compatibility issues in terms of the OpenVPN config params. In case this problem affects you, here’s how to fix it.
Social Engineering: Firewall-Rules for your brain – Part 2
In the first part of this series you learned which behavioral patterns are usually used to influence humans. Those patterns are the basis of a Social Engineering attack and can usually be detected by a trained person. In the second part we will examine much more sophisticated influencing techniques. Those techniques are very tricky to…
Spying on everyone – Cheap and Simple
Introduction Espionage, or less formally “syping” has become a huge public topic in Summer 2013. Edward Snowden revealed that The American NSA (National Security Agency) and the allied Great Britain GCHQ (Government Communications Headquarters) are surveilling, storing and examing all network traffic in- and outbound the US and Great Britain. The debate covered the Newspapers…
Social Engineering: Firewall-Rules for your brain – Part 1
Humans can be regarded as one of the biggest weaknesses for secure systems. Their interaction with technology and awareness for information security makes them usually the “weak link” for gaining access to enterprise networks and private information. From an attackers point of view the investment of using a human to hack a system is much…
Blockchain – Revolution or hype?
Welcome to our journey through the blockchain, since the emergence of Bitcoin, one of the most trending topics of the global digital village. After reading this blog post, you’ll have a basic understanding of the technology, a wide overview of future use cases and are able to differentiate between realistic potential and hype. In the…
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Containers Continuous Integration data protection deep learning DevOps distributed systems Docker Games Git gitlab Gitlab CI Google Cloud ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js privacy Python scaling secure systems security serverless social media Terraform Test-Driven Development ULS ultra large scale systems Web Performance
You must be logged in to post a comment.