Our Blog

Codevember IX: A Weekend of Innovation, Creativity and Fun

This year’s Codevember IX hackathon was an unforgettable experience! The event was hosted by AI Xpress in Boeblingen, the location is simply awesome for tech enthusiasts.

Our Codevember IX weekend was running from Friday until Sunday. We were thrilled to meet old study colleagues from around Germany and even the Czech Republic. This year’s event was a bit special, since we had our first non-digital project by pitching a self-made board game. Other projects focused on creating a 2D game in Unity, 3D modeling and printing analog gaming figures, and further developing our daily used Telegram bot written in Python. Overall it was great to reconnect with friends, and have a fantastic time building and developing together.

» Read full article…

Paraspace: Interaction on a new Level

Paraspace is an easily deployable, open-source framework that allows highly interactive installations and performances for e.g. artists and companies.

What’s Paraspace?

Paraspace is a framework which, once deployed, can be used as a tool to provide a broad set of interactions between an artist or installation and visitors. Basically, it’s a server that provides an interface to configure various views for providing information without reloading. In addition, interaction modules such as slider or trigger-buttons are possible which can be linked with a specified output source on the performer side (MIDI, OSC or logging). The whole system is very modular and can easily be adjusted and extended according to your needs.

Well, this is still quite abstract, isn’t it? Let’s dive deeper into some examples.

» Read full article…

I always forget my Keyboard Shortcuts

Vim, Visual Studio, Visual Studio Code, Windows Powertools – I’m daily using a bunch of feature rich software. And everyone who once used Vim (or Emacs) knows there sometimes is no way around keyboard shortcuts! Or is there? In this post I like to show off a personal project, my very own macropad. In the projects section you’ll find an in depth look at the macro pad as well as all designs and source code.

» Read full article…

Step up your game – Upgrade from C to C++

When writing complex programs in C, one will be confronted with the topic of code redundancy and accessibility control issues. C++ was first introduced in 1983, called “C with classes”, and solves a bunch of hurdles stumpling upon programming in C.

The advantages of object-oriented programming languages

Defining complex data structures in C remembers of defining records in a functional programming language. When defining methods over several similar structures, the code redundancy gets clear – every struct needs its own implementation. For all functions or calls.

» Read full article…

Recipe: How To Translate A Recursive Function Into An Implicite One

In order to determine the runtime of a recursive function, it is helpful to translate this function into an implicite one. This blog post illustrates a straight-forward approach, intuitively – with exactly 5 steps on a small example. This approach is also applicable for almost every recursive function.

Why Tho?

The reason to resolve a recursive function lies in the analysis and application. When interested in runtime analysis, the implicite function will serve as a guidance for the total runtime of the recursive function. When interested in application, the implicite function will have the same

» Read full article…

An (in-)formal Introduction To Attack Defense Trees

It is widely known that the security of a system seen as property is not static. Therefore, there cannot exist a general algorithm deciding whether or not a given system is secure in its sense. IT-Security Architects and Engineers are stuck with persistent research of bug reports of the technology the respective enterprise is using. In the industry, IT security is one use case of many others. The types of systems to examine vary depending on context. For instance, the construction of a museum is considered as a system and it is of interest to guarantee that the objects, stored in this kind of facility, are considered safe and sound. In consequence, it is urgent to establish a formal model for system description and security evaluation. There are various challenges to overcome, for instance:

  • What are the best defensive measures to invest in?
  • How can it be decided whether a defensive measure from the past is still necessary?
  • How can newly discovered attacks be efficiently documented?
» Read full article…

Finish **it! Jam // January 2021

Everybody knows it: You’re starting a game or project in your spare time or in a game jam and then the time runs out or the jam finishes, but the project doesn’t. Nevertheless, the project keeps popping up in your head every now and then… Now is the time to grab out one of your old projects and push it at least to an alpha or beta prototype!

» Read full article…

The Codevember 2020

This year was quite a mess with a lot of stuff that happened which led to a felt state of complete chaos. But as in every case: from chaos arises new order. While we had some trouble with the economy and the health systems and a lot of challenges to handle, the COVID-19 pandemic also triggered a lot of changes in social and political aspects: A lot of conservative pattern and habits were questioned and partly dissolved. We had the chance to experience change in places where we didn’t expect it and (sadly) also to wait for the change which never happened.

» Read full article…

A Few Words On Algorithm Complexity

One of the key properties of a given algorithm is its complexity. A computer scientist is interested in the adequacy of the algorithm runtime relative to the size of the input. While there exist sharp runtime lower bounds for any given algorithm, for upper bounds however, the sky is the limit. It depends on the quality of optimization.

» Read full article…