Microservices, APIs, SOA

I found a great article on "Microservices, SOA, and APIs: Friends or enemies?"
check it out.. really easy to understand the differences


A little bit about Microservices:

It's often said.. complex code is spaghetti code (with meatballs = OOP), well structured layered code is lasagne code.. and microservices ravioli code.

On bigger applications.. a well thought out monolithic modular app might not be enough or at least not performant enough.

Big companies like Netflix talk about it.

The millions of users require:

  • fast startup times,
  • easy and reactive ui,
  • working movies (main functionality),
  • no downtimes and
  • always new features/updates.

The solution to this of course is a microservice application

Thoughts before creating microservice instead of monolithic applications:

  • Do you need to scale? How much concurrent users do you have?
  • Does your application or several parts really need to have a high-availability?
  • Do you develop in separate teams or is everyone on one team?


  • Scalability:
  • Microservices can be monitored really well, giving you metrics to find services with high hardware requirements or faulting services
  • run multiple instances for particular services, making reaction times really fast by also giving you a high availability (in case they crash)
  • You can run/scale on multiple Servers / PaaS Instances (Pivotal, AWS, ...) with different spec requirements depending on what your microservices needs
  • Improved Isolation:
  • every Microservice should be one logical part and thus can be updated or refactored or exchanged separate without affecting the others
  • By doing only one particular job (bounded context).. your microservices become easier to read, test and optimize
  • You can use multiple programming languages in one project. eg. node.js, ruby, c#, python, c, R.. in the end you talk via API
  • Background Services:
  • You can run background jobs, which wait for events to start working. they can do things without your interaction.


  • Distributed System Complexity (Logging, Monitoring, Network, Msg Queues, Multiple Instances, )
  • with more Services, more parts can fail
  • Architecture causes network-load and can be slowed down by network-latency
  • May have double code for same helper functionalities

Programming Services it is highly recommended to apply the principles of

12 Factor Apps


  • Code is Version controlled with many deploys [Codebase]
  • Dependencies are declared and isolated in a manifest [Dependencies]
  • Configurations are stored in ENVironment variables, not config files [Config]
  • Service are attached Resources, which can be consumed over Network (local or 3rd Party) and can be detached at will [Backing Service]
  • Build and Run stages are seperated. Providing a faster, tested and better Release Management. [Build, release, run]
  • Services are Stateless. They share nothing. They only use persistent data from backing stores. Thus they can easily be scaled. [Process]
  • To fit the concurrency needs, services are exported via Port Binding. [Concurrency]
  • Processes should be designed to be disposable without hassle [Disposable]
  • You should have a similar Developement and Production environment, designed for continuous integration. [Dev/Prod parity]
  • Logs should be treated as Event Streams. The App should never be concerned of storing logs. [Logs]
  • Management Tasks running as Processes: no local terminal, no direct db access. [Admin processes]

Terminator won’t start

I ran into a stupid error.

My terminal client Terminator wouldn't start on ubuntu and I didn't get any no error either.

I started it via terminal. Here I got the following error:

except (KeyError,ValueError), ex

I found the problem and solution
python3 was changed to my default system python

=> changed it back to 2.7, everything works again

I use update-alternatives

you can set up things easily. eg. python

check if it's maybe already set up for python

# CHECK if setup for python
update-alternatives --list python

otherwise set up the alternatives

update-alternatives --install /usr/bin/python python /usr/bin/python2.7 1

update-alternatives --install /usr/bin/python python /usr/bin/python3.6 2

and configure the version you want to be used by default

update-alternatives --config python

There are 2 choices for the alternative python (providing /usr/bin/python).
Selection Path Priority Status
0 /usr/bin/python3.6 2 auto mode
1 /usr/bin/python2.7 1 manual mode
2 /usr/bin/python3.6 2 manual mode
Press to keep the current choice[*], or type selection number:


Here are some Badges of courses I've taken.


You get also PDF certificates which you can print.


RIPE Database Expert Course

What you actually learn: 
How to get Data out of the RIPE DB, how to Register new IPs.
Best practice for registering Networks.

1 - RIPE Database Basics
Let's get started! Learn about the different object types and how they relate to each other.

2 - Registering Contact Information
Create your first RIPE Database objects. Learn how to create a person and role object in the RIPE Database.

3 - Querying the RIPE Database
How can you find information in the RIPE Database? And how can you manage your search results?

4 - Protection Mechanisms
All of your RIPE Database objects must be protected. Learn how to add maintainers to your objects.

5 - Creating Assignments
Learn the concept of hierarchical authorisation and create assignments in the RIPE Database.

6 - ROUTE and ROUTE6 Objects
Learn what route and route6 objects are and how you can create them.

7 - Reverse Delegation
Learn how you can setup reverse DNS delegation in the RIPE Database

Introduction to IPv6 Course

What you actually learn:
How IPv6 works and whats different in v6 Protocols (instead of ARP, RIP, DHCP).
How many IP subnets to assign for different needs (sizes of houses, companies).
How to implement some security features, based on IPv6 Addresses.

1. From IPv4 to IPv6
Let's get started! From IPv4 exhaustion straight into IPv6. Let's see why it is a good idea to start working on your IPv6 network.

2. IPv6 Address Basics
Learn how to write IPv6 addresses correctly and calculate your first IPv6 subnets.

3. IPv6 Transition Mechanisms
What are the most used IPv6 Transition Mechanisms? Go through our list to learn the trends.

4. Deploying IPv6
SLAAC, ND, DHCPv6, DNS...don't let the acronyms fool you. Let's look at the best ways to take advantage of IPv6 characteristics.

5. Get and Register IPv6
Do you need to request your IPv6 allocation? Do you have an IPv6 allocation but you don't know how to register it? This section is made especially for you.

6. IPv6 Assignments and Addressing Plans
Learn IPv6 assignment best practices and get inspired for your addressing plan.

7. IPv6 and Security
Discover the different security aspects you need to consider when you deploy IPv6.

well.. who doesn't like badges ūüėČ

online courses, moocs and video lecture portals

I often use e-learning portals to learn new stuff.
You don't need them exactly, nowadays you could learn everything on youtube, medium, github or free e-books.

However, the good about courses/e-learning portals is, the authors do create more courses, get feedback and get better at teaching stuff. You often get a certificate, which can be motivating seeing your progress.

There are also courses made by universities or colleges. Here you can often buy a qualified certification.
These are usually different: high quality, academic correctness where the information comes from. Since I am used to it.. I love this as well. But they often expect previous knowledge to understand the topics.

And there are learning portal joint-ventures from big companies like microsoft, ibm, ...

I found there is a pile full of learning portals out there.
I wanted to give you a list of some for IT and computer science related topics I use.

Search Portals

But first.. there's a company which created a search portal to find online courses:

There is also a search portal for certificates:

Academic Education Sites

HPI (Hasso Plattner Institut): http://open.hpi.de/

High quality business, software, new it technology and it law related (german) courses.

A good thing is.. you can enter the courses even afterwards.. if you don't mind learning for the knowledge not for the certificate. Or qualified certificates which can be credited as ECTS if you are a student.

These are the courses I absolved here:

About Semantic Web Technologies

  • Information Service Engineering (semanticweb2017)
  • Linked Data Engineering (semanticweb2016)


  • Blockchain: Hype oder Innovation? (blockchain2018)
  • IT-Recht f√ľr Software-Entwickler

edX: https://www.edx.org/

Lots of high quality university courses from MIT, Harvard University, University of California Berkley, RWTH Aachen, Technische Universit√§t M√ľnchen, Hongkong University of Science and Technologie, Kyoto University, Peking University...

on different topics

Architecture, Art & Culture, Biology & Life Sciences, Business & Management, Chemistry, Communication, Computer Science, Data Analysis & Statistics, Design, Economics & Finance, Education & Teacher Training, Electronics, Energy & Earth Sciences, Engineering, Environmental Studies, Ethics, Food & Nutrition, Health & Safety, History, Humanities, Language, Law, Literature, Math, Medicine, Music, Philanthropy, Philosophy & Ethics, Physics, Science, Social Sciences

You can get paid qualified certificates which can be credited as ECTS or just view the courses and maybe upgrade to a verified certificate later. You can also get a Micromasters Degree for certain topics.

Education Sites

Pluralsight - https://www.pluralsight.com/

High quality Software development, IT Ops, Professional Business, Data Professional, IT-Security, Design, Photography courses. Some courses have a clearly knowledge prequirements.

Price is a monthly or annually fee
35 $ / Month or 299 $ annually
or the premium version with certification practice exams for 449 $ annuall

There are some weekly free courses... I recommend you to check it out!

Udemy - https://www.udemy.com/

Medium to high quality.. for lots of different interesting topics. Often very good and easy explanation. Lots of trainers.. so every course might be different.
Prices for courses are ~10-12 EUR.. 100 EUR

Coursera - https://www.coursera.org/

High quality university like MIT, Princeton, UCS or Google courses
You can take courses, get specializations, professional certificates, master track certificates or even degrees. You often need to know pre-requirements
Price range is from free to 30k (masters degree), depending on what program you choose

Udacity - https://eu.udacity.com

high quality courses on computer science, programming, autonomous systems, business and career from the big companies like google, nvidia, kaggle, amazon, ibm, unity
Price is 500-999 $ for a topic related nanodegree

THD Wirtschaftsinformatik Studium – Semester 5

Was lernt man an der THD? (Stand 2016)

Content Management und Document Engineering

  • Technische Dokumentation: Erstellung, Rollen, Juristische Bedeutung, Defizite von Dokumentationen, Sicherheitshinweise
  • Metadaten Suche
  • Content Life Cycle
  • Bausteinzentrierter Ansatz: Baustein-Pool, Regeln zur Modularisierung, Modularisiertes Schreiben, Eigenschaften von CMS, Variantenmanagement, Unterschiedliche Sichten, √úbersetzungsmanagement

Ausprägungen von Typen

  • Web Content Management Systeme (CMS)
  • Dokument Management System (DMS)
  • Redaktionssysteme
  • Enterprise Content Management (ECM)
  • Digital Asset Management (DAM)
  • Metadaten: Dublin Core, Schlagwortkataloge
  • Suchmaschinenratings: Textretrieval - Vektorraummodel, Hyperlinkbasiertes Retrieval
  • Single Source Publishing Systeme (SSPS)
  • XML: Dokumentzentriert, Datenzentriert
  • SVG: Darstellung


  • Business Process Modelling (mit BPMN): camunda
  • Erstellung/Verwaltung: IT-System unterst√ľtzt (mit Columbiasoft DocumentLocator)
  • Versionierung
  • Archivierung: Zeitarchivierung
  • Architekturen: FAT-Client / Thin Client, DMS -Bus, Content Repository, Workflow Komponente
  • Implementierung: Private/Public/Hypbrid/Community-Cloud

Data Warehouse (Schwerpunkt)

  • Aufgaben, Varianten (SAP, MS, Oracle), Ziele,
  • Technische Siche: Konzepte, Performance, Daten (Beschaffung, Modellierung, Auswertung)
  • ETL, OLAP (verdichtete Informationen), OLTP (operative Transaktionen)

DataWarehouse - Business Intelligence - SAP BI

  • Architektur: Query, Infoset, MultiProvider, InfoCube, DataSourceObject, DataSoruce, Persistence, Source
  • Delta-Wichtigkeit
  • Datenfluss im SD Modul
  • SAP BW im Vergleich mit Excel-Pivot
  • Datenfluss im BI allgemein
  • Datenmodellierung, Transformation
  • Query Navigation, Variablen im Reporting
  • Hierarchien, Attribute, Texte
  • Multi-Cube, Prozesskette, Aggregate

In Memory Systeme

  • Funktionsweise, Vor- / Nachteile
  • Performance: Komprimierung, Partitionierung, Hardwaretrends
  • SAP HANA, BW auf HANA, Umgang mit Ressourcen (Hot, Warm, Cold)
  • Qlik

Programmierung multimedialer Systeme

Programmierprojekt in Java J2EE mit dem Spring Framework im Team:
Unser Programm: "Touchscreen BAR POS Kassensystem"

  • 2/3-Schicht-Architektur
  • N-Schicht Architektur
  • MVC : Pr√§sentation, Gesch√§ftslogik, Integration, Ressourcen
  • Eclipse Editor

Spring Framework

  • Beans (managed by Inversion of Control IoC)
  • Dependency Injection, DAO (Data Access Objects),
  • Metadata
  • Application Context
  • Spring Security CSRF, Sectag
  • Baeldung
  • Angeschnitten: Envers, Quarz, Silenium

Dependency Injection, DAO (Data Access Objects), Metadata, Application Context

  • Java JPA / Hibernate (als DB Persistenzschicht oder object relation mapping)
  • DAO: unidirektional 1:m, bidirektional 1:n, bidirektionale n:m Relation
  • Java iText: PDF output
  • git workshop

IT-Sicherheit (Schwerpunkt)

  • Begriffe: safety, security, CIA-Kriterien: confidentiality, integrity, availability; dependability, controllability, accountability, legal liability, protection, privacy, compliance, Vorratsdatenspeicherung, WLAN St√∂rerhaftung, KRITIS, SPoC
  • Gesetzliche Vorgaben: ¬ß BDSG, ¬ß TKG, ¬ß TMB
  • S√§ulen des Datanschutzes: Zuverl√§ssigkeit, Zweckbindung, Transparenz, Korrekturrechte, Datensicherung, Kontrolle, Sanktionen > Recht auf informationelle Selbstbestimmung
  • Schutzziele: Vertraulichkeit, Integrit√§t, Verf√ľgbarkeit


  • Angriffstypen: shoulder surfing, social engineering, man-in-the-middle-attack, browsing, sniffing, keyboard logger, fake login screens, traffic analysis, data diddling, Denial of Service (DoS), ping of death, SYN-flood, teardrop, brand, wasser, sturm, vandalismus, sabotage
  • Sicherheitsl√ľcken: exploits, zero-day-angriffe, spam, phishing
  • Schadprogramme: ransomware, trojaner, viren, dialer, bot-netze
  • Innent√§ter, Missbrauch, Fraud
  • Innovative Technologien: P2p, Voip, WLAN, Data injection, SCADA: Stuxnet, RFID, Biometrische Verfahren, DRM, Desktop Firewalls, Grid-Computing, Vernetze Autos, Smart Home

Security Engineering

  • Analyse, Modellierung (nach TISEC), Sicherheitsarchitektur
  • Organisatorische Einbindung der IT-Sicherheit: IT-Sicherheitsmanagement-Team (Bereichs-/Projekt-/System-/Sicherheitsbeauftragter)

IT-Grundschutzkataloge des BSI: ISi-Reihe (Internetsicherheit)

  • Absicherung eines Servers
  • Absicherung eines PC-Clients
  • Sichere Anbindung lokaler Netze an das Internet
  • Sicherer Fernzugriff auf lokale Netze
  • Sichere Bereitstellung von E-Mailservern
  • Sicheres Bereitstellen von Web-Angeboten
  • Sichere Virtuelle Private Netzwerke (VPN)
  • Sichere Nutzung von Web-Angeboten
  • Sichere Nutzung von E-Mail
  • Sicheres Wireless WLAN
  • Sichere Internet-Telefonie (VoIP)


  • 100-1, 100-2, 100-3: inzwischen von 200-x abgel√∂st
  • 200-1 Managementsysteme f√ľr IT-Sicherheit
  • 200-2 IT-Grundschutz-Methodik
  • 202-3 Risikomanagement
  • 100-4 Notfallmanagement


  • TCSEC / "Orange Book": Identifikation und Authentifikation, Rechteverwaltung, Rechte-Kontrolle, Audit, Wiederaufbereitung
  • Cobit (Control Objectives for Information and related Technology)
  • ITIL (IT Infrastructure Library)
  • ISO TR 13335 (GMITS): Technical Report; Management of Information and Communications Technology Security

Sicherheitsmodelle und Architekturen

  • Zugriffskontrollmodelle: benutzerbestimmbare (DAC), systembestimmbare (MAC), rollenbasierte (RBAC), Zugriffsmodelmatrix (ACL), dynamische: Harrison-Ruzzo-Ullman-Modell, Brewer-Nash, Chinese-Wall-
  • Rollenbasierte Modelle: Benutzer-Rolle-Zugriffsrechte
  • Sicherheitsmodell: Ber√ľcksichtigung organisatorischer Hierarchie
  • Bell-LaPadula-Modell: dynamische Zugriffsmatrix, multilevel-Sicherheitsmodell
  • BIBA-Modell: zugriffsorientierte Maschine (no write up, no read down)
  • Clark-Wilson-Modell: Integrit√§tsziele: Verhinderung unzul√§ssiger Modifikation unautorisierter Anwender, Aufrechterhaltung der Konsistenz, Verhinderung unzul√§ssiger modifikation durch autorisierte Anwender
  • Verbandsmodell: Hasse-Diagramm: beschreibt zul√§ssige/unzul√§ssige Informationskan√§le


  • Operationelle (IT, Strategie), Finanzielle Risiken
  • Risiko = Tragweite * Wahrscheinlichkeit des Auftretens
  • Risikoanalyse, Risikovermeidung, Risikomonitoring
  • Klassifikation von Informationen:
  • Privatwirtschaft: confidential, private, sensitive, public
  • Milit√§r und Beh√∂rden: top secret, secret, confidential, sensitive but classified, unclassified
  • Schutzbedarffeststellung: Kategorien: "normal", "hoch", "sehr hoch"
  • Personalmanagement: Zuk√ľnftige MA pr√ľfen, non-disclosure agreement, Rechte nach Beendigung eines Arbeitsverh√§ltnisses entziehen, Dokumentation
  • Kontrollmechanismen: Administrative/Technische/physische Kontrollen
  • Kosten und Nutzen: ROSI (Return on Security Investment)
  • Fallstudien: Rootkits
  • Trends und weitere Entwicklung
  • Initiativen des BSI zur IT-Sicherheit

Informatik-Controlling (Schwerpunkt)

  • Strategische IT-Planung: Situationsanalyse, Visionen, Missionne, Kritische Erfolgsfaktoren
  • Competetive Forces Modell nach Porter
  • Wirtschaftlichkeit von IT-Systemen
  • Balanced Score Card
  • Kostenrechnung in der IT
  • Kennzahlen in der IT


  • SAP Organisationseinheiten, Stammdaten, Bewegungsdaten, Transaktionsdaten, Belege / Dokumente, Materialstamm Sichten
  • PLM (Product Lifecycle Management): Innovation, Produktentwicklung, Produktpflege
  • CRM(Customer Relation Management): Marketing, Kundenangebot/-auftrag, Service
  • SCM (Supply Chain Management): Einkauf, Fertigung, Montage, Produkt QM, Arbeitsvorbereitung, Packerei/Versand, Lager
  • HR/HCM, IT, FI, CO, OR, QM, Projektmanagement
  • SAP MM
  • SAP SD
  • SAP PP
  • SAP FI
  • SAP CO
  • Procure-to-pay Prozess: BANF, MIGO, MIRO
  • Order-to-cash Prozess
  • Purchase-to-Payment Prozess


  • Arbeiten an Cisco Routern, Switchen
  • Routing: static, dynamic
  • Dynamische Protokolle:
    • Distant Vector: RIP, RIPv2, RIPng, IGRP, EIGRP
    • Link State: OSPF
  • Switching: Port Security, 802.1Q VLAN
  • IP-Subnetting
  • Error Troubleshooting, Wireshark



  • Merkmale
  • Definition
  • Projektdimensionen
  • Voraussetzungen
  • Einordnung im Unternehmen
  • Dokumente
    • Baseline
    • Aufzeichnungen
    • Bericht

Prozesse / Phasen

  • Projektentstehung
  • Projektinitiierung
  • Projektdurchf√ľhrung
    • Go Live
    • Phasen√ľberg√§nge
    • Dokumentation
  • Projektabschluss
    • Abschlussbericht
    • "Lessons Learned"

√úbergreifende Themen

  • Business Case
    • Fortlaufende gesch√§ftliche Rechtfertigung
    • Umfeldanalyse
  • Organisation
    • Rollen: gem√§√ü PRINCE2, Informelle Rollen
    • Verantwortlichkeiten
  • Pl√§ne:
    • Produktbasiert
    • Projektstrukturplan (PSP)
    • Ablaufterminierung
    • Kritischer Pfad, Kritische Kette
    • Netzplan
    • Ressourchenplanung
    • Kommunikationsplan
  • Fortschritt
    • Ereignisgesteuert: Phasenabschlussbericht, Projektabschlussbericht, Ausnahmebericht, Offener Punkt-Bericht
    • Meilenstein-Trend-Analyse
    • Abweichungsanalyse
    • Managementphasen
    • Critical-Chain-Management
    • 90%-Syndrom
  • √Ąnderungen
    • Change Request
  • Qualit√§tsmanagement
    • Leistungsmerkmale
    • Testmanagement: Quality-Gates
  • Risikomanagement
    • Bedrohungen
    • Chancen
    • Risiko Piktogramme
    • Risikobehandlung
    • H√§ufige Risiken
  • Kommunikationsmanagement
  • Konfigurationsmanagement


  • RADAR-Methode
  • PULS-Probleml√∂sungsmethode
  • SMART-Ziele
  • Projektbewertungsgr√∂√üen: KPI, ROI, Muss
  • Stakeholder Analyse
  • Einzel-/Multi-Projectmanagement
  • Projektcontrolling
  • Vorgehensmodelle im Software Engineering

Yongnuo Flash on Sony Alpha 7 Series?

Can you use a Yongnuo Speedlight YN560 III for Canon Nikon Panasonic Pentax on a Sony Camera (Sony Alpha 7 7R 7II 7RII 7III, A6000 / a6300 / a6500)?

The answer is: YES, you can!

I'm writing this because I've found a few blogs, youtube videos that it works but not how exactly.

It's a simple flash meaning no automatic or ettl. Manual mode only.

If you want flashes as studio environment to control your light (M, ISO100, f8 or higher, 1/160) as me... it is a really great and affordable equipment!

I needed two off-camera flashes for portraits.
Thats why I got myself

  • 2x Yungnou YN560-III for Canon (~50 EUR; IV Version costs ~60 EUR)
  • Yongnuo RF603C II for Canon (Wireless Remote trigger)

and also...

  • Pixel RW-221 E3 Wireless Shutter Release Remote Controller for Sony
  • 8x BONAI AA 2000mah rechargable batteries
  • 8x Amazon Basics AAA 750mah rechargable batteries

I wanted a remote trigger off-camera...
since I didn't know if the Yongnuo Remote Trigger will work for that...
I got myself one from Pixel (Single Shot, HighSpeed, Bulk, TimeTrigger)

It is not connected via the flash hot shoe as it might seem. You get a 2.5mm to usb cable to connect it to the multi-purpose usb port on the Sony camera.

The Yongnuo RF603C II can also be used as Remote Control

on-camera: it is connected via the flash hot shoe
off-camera: 2.5 usb cable needed!! (not included)

on-camera: one trigger on camera (TX mode)
off-camera: one trigger on camera (TRX mode), the other in the hand (TRX mode)

for that the settins on the YN560-III need to be set to M on wireless mode

The whole flash gear..

THD Wirtschaftsinformatik Studium – Semester 7

Was lernt man an der THD? (Stand 2017)

E- und M-Business

  • Verhaltens√∂konomie
  • Wirtschaftliches Verhalten: Ph√§nomene und Mechanismen
  • Homo Oeconomicus
  • Transaktionskosten
  • E-Commerce
  • Suchmaschinen, SEM/SEO
  • Nudging
  • Social, Local, Online/Mobile Marketing
  • Individuelle Bed√ľrfnisse
  • Opportunit√§tskosten
  • Preis- Strategien
  • Crowdfunding
  • Sicherheit & Bezahlsysteme
  • Web Usability
  • Experten/Expertise
  • Prognosen
  • Barrierefreiheit
  • Kaufentscheidungen verstehen & Verhalten beeinflussen
  • Ethische Aspekte
  • Automatisierung
  • Disruptive Innovation
  • The Long Tail
  • Grenzkosten
  • Freemium
  • Psychologische Gestaltung von Preisen
  • The Glass Cage
  • Null-Grenzkosten-Gesellschaft
  • Makers
  • Trust, Attention
  • Gamification
  • Sharing Economy
  • Plattform Revolution

Screen Design

Design von Alltagsgegenständen

  • Affordances
  • Signifiers
  • Mappings
  • Feedback
  • Constraints
  • Conceptual Models


  • SRK: Skill / Rule / Knowledge-Based Behaviour
  • Informationsverarbeitung: Wahrnehmung, Kognition, Handlung
  • Aktionsstufenmodell: Goal, Plan, Specify, Perform - Perceive, Interpret, Compare
  • Design Principles: Contrast, Repetition, Alignment, Proximity
  • Fovea: Brain Pixels
  • System 1, System 2
  • Change blindness: Did you see the gorilla?
  • Optische T√§uschungen : Farben, Wahrnehmung von L√§nge
  • Visuelle Wahrnehmung: Bottom up, Merkmale
  • Gestalt-Gesetze: √Ąhnlichkeit, N√§he, Geschlossenheit, Pr√§gnanz oder gute Gestalt, Fortsetzung und Erg√§nzung, Gemeinsames Schicksal, Vertrautheit
  • C.R.A.P. : Contrast, Repetition, Alignment, Proximity
  • Informationsdarstellung
  • SEEV-Modell: Salience, Effort, Expectancy, Value
  • Capacity Model of Attention
  • Automation: Workload
  • Multiple Ressource Theory

Darstellung von Informationen

  • Diagrammtypen: Balken, Punkt, Linien, Sparklines, Box Plots, R√§umliche Karten, Heatmaps, Treemap, Bullet-Grafik
  • Display-Design: Visuelle Wahrnehmung: Redundanzen nutzen, Unterscheidbarkeit, Bildhafter Realismus, Bewegte Teile, Kosten des Informationszugangs
  • Proximity Compatibility Principle
  • Wissen der Welt: Interkulturelle Aspekte
  • Vorhersagehilfen
  • Konsistenz
  • Joy of use
  • Dashboard-Design

Heuristische Evaluation

  • Sichtbarkeit des Systemstatus
  • √úbereinstimmung zw. System und realer Welt
  • Konsistenz und Standards
  • Fehler vermeiden
  • Erkennen vor Erinnern
  • Flexibilit√§t und effiziente Nutzung
  • √Ąsthetisches und minimalistisches Design
  • Unterst√ľtzung beim Erkennen, Verstehen und Bearbeiten von Fehlern
  • Hilfe und Dokumentation

Wissensbasierte Systeme

Daten, Informationen, Wissen

Verarbeitung: Erkunden, Suchen, identifizieren, Untersuchen, Analysieren, Bewusstmachen, Entscheiden, Verbessern, Restrukturieren, Behalten, Informieren

K√ľnstliche Intelligenz

  • Wissensbasierte Eigenschaften: Symbolverarbeitung, Besitz eines inneren Modells, Schlussfolgern, Abstraktion, Spezialisierung, Transfer, Strategiebildung, Anpassungsf√§higkeit, Lernf√§higkeit, Handhabung unterschiedlicher Informationsqualit√§ten, Mustererkennung, Sprachverstehen
  • Logik
  • Turing-Test
  • Neuronale Netzwerke
  • Hidden Markov-Modelle (HMM)
  • Belief Networks
  • Ontologien und Wissensbasen
  • Lernverfahren im Data Mining
  • unscharfe Aussagen
  • unvollst√§ndiges verzerrtes Wissen
  • Wissensbasierte Systeme
  • Wissensakquisition: Indirekt / Direkter Wissenserwerb
  • Techniken: Expertenbeobachtung, Problemdiskussion, Problembeschreibung, Systemverfeinerung, Systemvalidierung
  • Wissensbasierte Methoden: Wissensrepr√§sentation, Heuristische Suche, Meta-Reasoning, Konnektionismus (NN), Mustererkennung
  • intrinsische/extrinsische Eigenschaften
  • Semantische Netze
  • Ontologien: Objekte, Eigenschaften, Beziehungen, Axiome, Prinzipien
  • OWL: Full / DL, RDF
  • Wissensrepr√§sentation: Logiken, Regeln, strukturierte Objekte
  • Prolog
  • Suchverfahren: ersch√∂pfend, heuristisch
  • Suchalgorithmen: Suchbaum, Genetische , fallbasiertes Schlie√üen


  • Softwaretechnische Werkzeuge: Intranet, Case-Based-Reasoning (CBR), Know-how-Datenbanken, FAQ, Answer Garden, Selektive Informationsverteilung, Groupware, Workflow Systeme, Wissenskarten, Web 2.0, Web 3.0, Weblogs: unternehmensintern/extern, Wiki, Podcast, Social Bookmarking/Tagging
  • Virtuelle Communities / Netzwerke
  • Wissensportale: Personalisierung, Suche, Zusammenarbeit, Sicherheit, Dynamik, Erweiterbarkeit, Content Management, Bedienerfreundlichkeit
  • Haus des Wissens: Wissenskultur in Mensch, Organisation, Technik
  • Integration: EAI, RFC, COBRA, SOA, API, REST
  • Wissensmanagement erfolgreich einf√ľhren: Sensibilisierung, Planung (Kultur, Ziele, Organisation, Strategie), Durchf√ľhrung (Implementierung, Rollen, Change), Controlling (Erfolgsmessung)

Maschinelles Lernen

  • empirisch / induktiv
  • deduktiv / speedup learning
  • √úberwacht (Supervised, Input: Daten + Klassifikation)
  • Un√ľberwacht (Unsupervised, Input: nur Daten)
  • Neuronale Netze
  • Incremental, Backpropagation, Alpha/Beta Error
  • Realworld-Netze: Spam-Erkennung, Kreditw√ľrdigkeit
  • Tellim-System (Intelligent Multimedia System):
    Personalisierung / Kontextualisierung
  • Chatbots: AIML
  • Expertensysteme
  • Lernen 4.0 / E-Commerce 4.0 (Mass-Customization) / Industrie 4.0 (MES, ERP)


  • intelligente Agenten: Umgebung (zug√§nglich, deterministisch/stochastisch, episodisch/sequenziell, statisch/dynamisch, diskret/kontinuierlich), Rationalit√§t
  • schwache/starke KI
  • PAGE (Percepts, Actions, Goals, Environment)
  • Agentensystem Architektur: Reaktiv, Proaktiv, Subsumption, Automaten
  • Sensorverarbeitung Robotik
  • Kommunikation: Protokolle, KQML, MsgQueue, RabbitMQ
  • FIPA: Kommunikation, Sprechakt, Inhalt; performatives
  • Kooperation und Verhandlung
  • Anwendungen: Verteilte Systeme (r√§umlich, zeitlich, semantisch, funktional), Netzwerke, Mensch-Maschine Kommunikation
  • Ethische Verhaltensvorgaben f√ľr Intelligente Agenten

SanDisk MicroSD card performance tests

I have several MicroSD cards.. I've been checking them for performance.
I use them in a GoPro Hero 5 Black or in my Samsung S9 for photo and 4k video.

What cardreader was used?

At first I tried with my Kingston FCR-HS3 Card-Reader I usually use (for CF Cards) but I noticed about 10 MB/s slower transferrates each time.

So.. for testing I've been using now a USB3 MicroSD Adapter UHS-1

I've been using CrystalDiskMark.
I ran the benchmark 2 times, best result is shown.

You can click on the images to buy the cards from Amazon via RefLink.

Here are my test results:

SanDisk Extreme U3 V30 MicroSD XC 64 GB

SanDisk Extreme U3 V30 MicroSD XC 128 GB

SanDisk Ultra A1 10 MicroSD XC 64 GB

React.js Tutorials

Right now I'm absorbing React.js tutorials/best practice for a new project I'm about to do. I'm going to write here soon about it.

Here are some great React Tutorials I found:

The videos is really good to follow and its practical.
They are usually between 5-15 min

In general I can recommend every YouTube tutorial by

The Net Ninja

Here are more of those