Year: 2015

  • Haidhausen

    View from a small passage leading away from a church, kind of central to an old  Munich district.

  • Plenumstreffen Sicherheitsnetzwerk München

    Plenumstreffen 2015 Des Sicherheitsnetzwerkes München. Am 22. Januar traf sich das Plenum des Sicherheitsnetzwerkes München. Agenda der Veranstaltung, die von Peter Möhring, Leiter der Geschäftsstelle, und Dr Kathrin Jaenicke, geleitet wurde, beinhaltete im wesentlichen den Rückblick auf das vergangene Jahr wie auch die Perspektive auf das kommende Jahr.

  • Internet of Things powered by Ubuntu #IoT

    Next to the available versions of Ubuntu for the Desktop, Server and the Cloud, Mark Shuttleworth announces a new version of Ubuntu for the Internet of Things. Snappy Ubunutu Core aims to provide a common firmware for “Smart, connected things” on ARM and x86, that introduces a new standard for update-ability and security. via Mark…

  • Technology is not our destiny. #dld15

    @amcafee: Technology is not our destiny. We shape our destiny. 🆕"Technology is not our destiny.We shape our destiny."#dld15 @amcafee pic.twitter.com/bs4vCqivnk — Antonio Vieira Santos (@AkwyZ) January 18, 2015 via Twitter.

  • XSS with a book.

    In Safari Books. https://twitter.com/fmavituna/status/555769470321688576

  • Complex Processes

    Observation Organizations have to become more mature in their processes while they grow. While this is true for all types of organizations, my perspective is an IT and IT related one alone, also being part of other organizations. With complex technologies coming into every aspect of business, individual solutions are being provided by increasingly specialized…

  • #DLD Campus Lecture Werner Vogels, Amazon CTO

    Raum W201, LMU Lehrturm, Professor-Huber-Platz 2, 80539 München via IBC – Einladung zur öffentlichen DLD Campus Lecture mit Werner Vogels (Vice President Amazon) am 19. Januar 2015.

  • Virtual Crime in Numbers

    Süddeutsche Zeitung, Januar 10, 2015 “Sueddeutsche Zeitung” has an infographic on Internet related crimes. The numbers displayed are about services targeted by phishing, which is unsurprisingly lead by email, the number of malware circulating, monetary value of damages through criminal activity, most hacked passwords and finally origin of attacks.  Source for these numbers are quoted…

  • Top Influencers in Security

    Tripwire has a recommendation of Security Influencers to follow in 2015, along with their Twitter handle. While I second all of the recommendations, it is particularily notable that 3 out of these 15 names work – or have worked – for Akamai. These guys are @BillBrenner70, @gattaca and @JOSHCORMAN. Every individual on the list had…

  • Homeautomation with Eve #IoT #CES2015

    Elgato presented a set of sensors to allow home-automation with Apple iDevices. The product goes by the name Eve.