Filtern
Jahr
- 2020 (5) (entfernen)
Publikationstyp
- Beitrag in einer Konferenzveröffentlichung (5) (entfernen)
Volltext vorhanden
- ja (5) (entfernen)
Schlagworte
- Ack Ratio (1)
- INET OMNeT++ (1)
- Privacy (1)
- Protocol Simulation (1)
- QUIC (1)
- Security (1)
- Transport Protocol (1)
- study programme development, negotiation, change of perspective (1)
Fachbereich / Studiengang
Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite.
In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.
While the service sector is growing rapidly, the purchasing of services has not yet received significant attention in theory or practice. Service purchasers face serious challenges, and existing purchasing practices for services are often non-strategic. We choose an exploratory–qualitative research approach to investigate the purchasing of IT, logistics and Maintenance, Repair, and Overhaul (MRO) services. In particular, we focus on the role of visibility and analyze how service purchasers can benefit from extensive knowledge about their service networks. We determine that visibility indeed adds significant value to service purchasing and can help service purchasers to decrease costs, mitigate risks and maintain competitiveness.
Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child.
In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality.
Study programme development is one of the most challenging processes
at universities since all faculty is involved. And in our experience, the redesign of already existing programmes seems to be even more difficult: Whereas innovative forces want to pick up new trends (e.g. digitalisation or other new teaching concepts) more conservative forces emphasises on values and refer to existing experience. Both positions are important and contextually right. Thus, the presented format provides a gradual framework to bridge the gap between both sides in an interactive and creative process.
Both sides are invited to negotiate the best possible result by using an unusual approach for university discussions, the benefit analysis method known e.g. from economics. After the negotiating activity, it should be obvious that a change of perspective is also helpful, if not necessary, to create a new or updated study programme. The practiced approach helps as well to recognise which limits for study programme development remain when visionary ideas are measured against reality.