Enhance Ideas and Technologies
The Internal Innovation Process
Together with students of our partner universities - LMU Munich and the University of applied Sciences Kempten - we continuously improve our software solution and search for new technology trends to integrate in our tool. We know that only by working closely together with representatives of industry and science we are able to create the best solution for ourselves and our customers.
This is an excerpt of our recent research projects
Conception and Implementation of UI Test AutomationThe goal of this project was to find the most effective solution for automated UI testing of the aumentoo web application. This involved the comparison of different tools and practices and resulted in the development of test suites based on the Selenium testing framework.
The insights gained from this project enabled us to improve our development process by getting earlier feedback on issues and being able to run our test suites on various platforms and devices on-demand.
Threat Modelling for WebservicesAt aumentoo, we believe that it is key to integrate security as an ongoing process throughout our application development lifecycle. This also involves methods to spot risks and flaws in our applications early on. Threat modeling is one of those methods which we have conducted in this research project to not only find weaknesses in our application but also within our organizational environment. We also performed simulated attacks against our application to evaluate our findings from the threat modeling process.
The outcome of this project helped us finding out what assets we need to protect and how we are going to protect them. Furthermore, it also made clear that risk estimation is essential for applying resources on issues that we will realistically face.
Comparison of Programming Languages and Design Patterns for the Implementation of an Android ApplicationThe purpose of this research paper was the theoretical and practical comparison of different common practices for the development of the aumentoo Android application in order to implement the best possible technologies for our solution. Our student started the approach by opposing various Android programming languages and design patterns. After that the most common ones were compared through performance tests.
The outcome of the tests was that Kotlin, as programming language, and MVC, as design pattern, are the most suitable and best performing technologies for aumentoo. The last step was to starting the development of the user interface for the first aumentoo Android application prototype.
Real-time Evaluation of Social Media DataSocial networks like Twitter, Facebook or Instagram have become the de facto standard for communication. This development was possible through the high availability of networks, especially facilitated through mobile applications. Additionally, the combination of todays smartphones and social networks makes it possible to share high quality media. Currently over 500 million tweets are sent daily on Twitter, about 10-15% of them containing images and geo-coordinates. This project was about investigating which type of evaluations (including a deep learning framework) can be made with the provided (real-time) data and what insights can be gained from them.
The acquired knowledge during this project helps aumentoo to quickly identify market trends, deduce regarding activities and develop forecasts.
Long-term Evidence Preservation of Cryptographically Signed DataThis scientific project deals with the problem of long-term signing of digital data considering the ArchiSig concept.
During the project the Technical Guidance TR-03125 was examined and an ArchiSig module was implemented, which was supposed to prove the advantages of the concept in practice.
Since aumentoo is a fully auditable application, long-term archiving of data plays a particularly important role. This ensures that it is always possible to restore a specific state of the application or individual content, at a specific point in time. Hence, the proof of this stage of work by an external entity is legally possible without giving access to the content to the external entity.