The “Tools for your SEP” is a series of talks for Bachelor students
In this introductory Scala session by Martin Mauch of crealytics <http://www.crealytics.com>
__
For a game idea to mature into a product it has to be made certain
Funny and broken technologies can be found all around our daily life.
Professor Sauer held a very interesting presentation about the topic. He showed some examples of how mathematics impact the brain and how diverse the separate areas in our head react to different numbers and methods. He also made great use of his own experiences in this field he gained from working together with the university of Gießen and drew a fascinating connection between mathematics and medical science. Thus also non-mathematicians were able to learn to differentiate between calculating numbers and doing mathematics via scientific images of the brain and understand the complex modeling of such data, that in its theory even reaches to the model of tone.
Mathematical methods have been present in brain research for a long
Like every year we will show a selection of tools that are useful for
During our talk »Tools for your studies« we will present some tools and tricks which can be helpful for new students and all those who are interested.
On June, 13th, 2016 three PhD students of Professor Apel’s Chair of Software Engineering visited us: Alexander Grebhahn, Claus Hunsen, and Andreas Stahlbauer. All three gave us an introduction into their research topics.
The first talk by Alexander Grebhahn was about non-functional properties and optimization. It is a significant topic in the context of Configurable Software Systems (CSS) because of the combinatorial explosion of the number of possible configurations. He presented different approaches to evaluate the performance of the different configurations to us.
On June 30th, two penetration testers of ATOS, Alex and Stephan, visited us. About 50 people joined the talk.
While Alex explained the backgrounds and methods to us, Stephan worked as the attacker. The took a simulated web shop as their example and were looking for weaknesses in it. The started with a cross-site-scripting attack in order to get the admin’s session; combined with a cross-site-request-forgery, the web page was manipulated and some bugs were shown.