A blog about current topics in computer science and media, maintained by students of the Hochschule der Medien Stuttgart (Stuttgart Media University).
Recent Posts
[Project] How to build an intelligent mirror – Part 3
Mirror, mirror on the wall, who is the fairest of all? It’s you, Albert. How Albert, our smart mirror, has grown – you can read it here. [written by Roman Kollatschny and Matthias Schmidt]
[Project] How to build an intelligent mirror – Part 2
Mirror, mirror on the wall, who is the fairest of all? It’s you, Albert. How Albert, our smart mirror, has grown – you can read it here. [written by Roman Kollatschny and Matthias Schmidt]
Exploring Docker Security – Part 3: Docker Content Trust
This third and last part of this series intends to give an overview of Docker Content Trust, which in fact combines different frameworks and tools, namely Notary and Docker Registry v2, into a rich and powerful feature set making Docker images more secure.
WhatsApp encrypts !?
The majority of the 1 billion monthly whatsapp users may be a little confused about the tiny yellow info-box in their familiar chat. End-to-end encryption? Is this one of these silly annoying whatsapp-viruses or maybe something good? The first big question is “why”. Why do we need a (so complicated) whatsapp end-to-end encryption? The most…
Secure Systems 2016 – An Overview, Walter Kriha
This is an attempt to provide an overview of the topics in “Secure Systems”, a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite lucky, as some of them…
Botnets – Structural analysis, functional principle and general overview
This paper provides an overview on the most important types of botnets in terms of network topology, functional principle as well as a short definition on the subject matter. By exploring the motivation of botnet operators, the reader will gain more insight into business models and course of actions of key players in the field.…
Exploring Docker Security – Part 2: Container flaws
Now that we’ve understood the basics, this second part will cover the most relevant container threats, their possible impact as well as existent countermeasures. Beyond that, a short overview of the most important sources for container threats will be provided. I’m pretty sure you’re not counting on most of them. Want to know more?
MirageOS
Introduction MirageOS is a new and rising trend when it comes to talking about cloud computing. More and more services are being relocated into modern cloud infrastructures, due to a lot of advantages like i.e. reduced costs, maximum flexibility and high performance. Todays services normally depend on big virtual machines (like i.e. Ubuntu Xenial with…
Exploring Docker Security – Part 1: The whale’s anatomy
When it comes to Docker, most of us immediately start thinking of current trends like Microservices, DevOps, fast deployment, or scalability. Without a doubt, Docker seems to hit the road towards establishing itself as the de-facto standard for lightweight application containers, shipping not only with lots of features and tools, but also great usability. However, another important topic is neglected very…
[Project] How to build an intelligent mirror
Hello there, today we want to feature a project, we were working in the last semester. A Smart Mirror. It’s not that new to build such a mirror and we’re not the first who built one. We still wanted to do it in another way with another focus. Instead of focussing on our own needs…
Buzzwords
AI Amazon Web Services architecture artificial intelligence Automation AWS AWS Lambda Ci-Pipeline CI/CD Cloud Cloud-Computing Containers Continuous Integration data protection deep learning DevOps distributed systems Docker Games Git gitlab Gitlab CI Google Cloud ibm IBM Bluemix Jenkins Kubernetes Linux loadbalancing machine learning Microservices Monitoring Node.js privacy Python scaling secure systems security serverless social media Terraform Test-Driven Development ULS ultra large scale systems Web Performance
You must be logged in to post a comment.