Kategorien
How-to Open Source

Generating Multi-Architecture Docker Images Made Easy

Docker is cool and portable, but distributing Dockerfiles comes at a disadvantage: The demands on the build environment are high. Distributing Docker images solves this, but building them for an architecture other than your CPU architecture seems complicated. Here is a simple solution.

Kategorien
Publications

HomeCA: Scalable Secure IoT Network Integration

Kategorien
Editorial General

A brief history of time(stamping)

This entry is part 2 of 2 in the series Timestamping

When I tell people about timestamping, they often react with, „Ah, yes, that Blockchain thing“. However, timestamping is as old as civilisation and has some interesting properties it gains from non-Blockchain applications. So let’s go back a few millenia first.

Kategorien
Editorial General

Timestamping: Why should I care?

This entry is part 1 of 2 in the series Timestamping

Timestamping documents is the basis for many forms of trust and evidence. As such, it is a building block for contracts and agreements, and dispute resolution.

Kategorien
Editorial How-to Open Source Tutorial

A SIP library is born

This entry is part 3 of 3 in the series Telephony of Everything

Inspired by Andrijan Möcker’s „Ãœberallklingel“ (Everywhere Bell), I decided to create my own. However, I wanted to use it with a motion sensor and therefore to be able to turn it off and on again, when necessary. I also felt that using Asterisk was overkill and it could be done quickly and much easier with […]

Kategorien
Editorial General

The Phone Advantage

This entry is part 2 of 3 in the series Telephony of Everything

Smartphones and apps have been hyped for over a decade now. But sometimes, the smartphone is not the smartest thing to get an interaction done. A dedicated device or even a plain old phone may be better. Let us look at some advantages of telephones.

Kategorien
Editorial General How-to

Telephony of Everything: From IoT to ToE

This entry is part 1 of 3 in the series Telephony of Everything

We all know about the Internet of Things. Cool or useless gadgets, which are each controlled by their individual app on our smartphone. This is often very convenient, but not always.

Kategorien
Publications

Requirements for legally compliant software based on the GDPR

Kategorien
General How-to Open Source Research

Ransomware is different

While most types of malware such as viruses and botnets try to lay low for as long as they can, while doing their nasty work, ransomware is eager to do its work ASAP. Because of this, ransomware does not need to embed itself as deeply into the system. All it wants to do is to […]

Kategorien
Publications

Einfache Zwei-Faktor-Authentisierung