BRZ TechBlog

BRZ TechBlog

The Austrian Federal Computing Center is the competence center for digitization in the federal administration. Our experts blog about interesting technical solutions and innovative ideas. In order to address an international community, we create all blog posts in English.

abstract image with blue lines and red dots
Techblog #10

File Encryption in OpenShift

The NIS2 directive requires quite a few (security) improvements everywhere. One of the changes the BRZ implements is per-file encryption for application data in the on-premise OpenShift installation.

more File Encryption in OpenShift

Abstrakte Grafik mit blauen und weißen Punkten

Now on OpenCode: Smaller Images!

"Open Code is the common platform of the public administration for the exchange of open source software" - and now we're contributing to it, too!
Our first contribution is a set of two small scripts (one in Perl5, one in Python3) that help to reduce image sizes in Kubernetes environments.

more Now on OpenCode: Smaller Images!

Abstrakte Grafik mit blauen und weißen Punkten

Troubleshooting by strace

Obscure command line options, lots of data, output readable only for the initiated - what's not to like?

more Troubleshooting by strace

WeAreDevelopers Logo

Hibernate: How to keep calm

Watch Gregor Lucnys (Lead Java Developer at BRZ) presentation at the WeAreDevelopers Java Developer Day in january 2023.

more Hibernate: How to keep calm

Abstrakte Grafik mit blauen und weißen Punkten

Symbolic Analysis of Grants

Our 2nd Tech Blog entry had a short description of Grants4Companies. Here we expand on what can be done as soon as legal texts are available in machine-interpretable (and not only machine-readable!) form!

more Symbolic Analysis of Grants

WeAreDevelopers Logo

Our Journey with Spring Boot in a Microservice Architecture

Watch Philipp Frauenthaler and Michael Eders presentation at the WeAreDevelopers Java Day in september 2022.

more Our Journey with Spring Boot in a Microservice Architecture

Techblog #6

Live Hack: Controlling a Smartphone via Laser

In the USENIX Security Symposium 2020 "Laser-Based Audio Injection on Voice-Controllable Systems" was presented: making MEMS-microphones believe that audio input happens via amplitude-modulated light from far away. We reproduced these efforts, to show that such threats are legit and shouldn't be underestimated.

more Live Hack: Controlling a Smartphone via Laser

Techblog #5

eBPF in OpenShift: finding the namespace

eBPF recently became very popular - for tracing, debugging, and performance measurements. Here I'll show how to use it in an OpenShift environment to find out which container resp. namespace is responsible for some behaviour.

more eBPF in OpenShift: finding the namespace

Techblog #4

Lines of Code

After the Log4Shell debacle in December (no, I don't want to provide a zillion links) some security aspect comes up in discussions again: Lines of Code, ie. the attack surface of services.

more Lines of Code

TechBlog #3

The Austrian Public Services Blockchain

The BRZ got a useful idea for a Blockchain project: notarizing document existence via their cryptographic hashes, codename "Blockstempel".

more The Austrian Public Services Blockchain

Techblog #2

Short intro to "Grants4Companies"

Our project "Grants for Companies" won the first price in the competition "eGovernment Wettbewerb 2021". In this blogpost, we show you some details about the implementation.

more Short intro to "Grants4Companies"

Techblog #1

Don't load-balance your (invisible) queues!

A queue is a device for delaying. A governor is used to control a flow. Control engineering tells you that you shouldn't add a delaying device into a control circuit as that may cause oscillations. That's easy, right? Well, only if you know about your queues – but there might be some invisible lurking to get you.

more Don't load-balance your (invisible) queues!