Sitemap - Main pages
- Home
- Research
- Cooperations
- Publications
- Real-time computing without stable states: A new framework for neural computation based on perturbations
- Real-time computation at the edge of chaos in recurrent neural networks
- PCSIM: a parallel simulation environment for neural circuits fully integrated with Python
- Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment
- Requirements Analysis for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Device
- A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
- A password-authenticated secure channel for App to Java Card applet communication
- Cyber Deception: Virtual Networks to Defend Insider Reconnaissance
- Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models
- Speeding up Semantic Segmentation for Autonomous Driving
- Multi-domain transfer component analysis for domain generalization
- Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags
- Real-world Identification for an Extensible and Privacy-preserving Mobile eID
- Central moment discrepancy (cmd) for domain-invariant representation learning
- Generalized online transfer learning for climate control in residential buildings
- Extracting Timed Automata from Java Methods
- Mining Constraints for Event-based Monitoring in Systems of Systems
- New Cardinality Estimation Methods for HyperLogLog Sketches
- Superminhash - A New Minwise Hashing Algorithm for Jaccard Similarity Estimation
- Adversarial Network Forensics in Software Defined Networking
- New Cardinality Estimation Algorithms for HyperLogLog Sketches
- Standard-free calibration transfer-An evaluation of different techniques
- WorkflowDSL: scalable workflow execution with provenance for data analysis applications
- Additive partial least squares for efficient modelling of independent variance sources demonstrated on practical case studies
- Using Crash Frequency Analysis to Identify Error-Prone Software Technologies in Multi-System Monitoring
- Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics
- Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
- Automatic Verification of Time Behavior of Programs
- Modeling Time in Java Programs for Automatic Error Detection
- Bagminhash - Minwise Hashing Algorithm for Weighted Sets
- Automatic Repair of Timestamp Comparisons
- Formal Analysis & Verification of Timed Programs
- Semantics-driven extraction of timed automata from Java programs
- Computing Extremely Accurate Quantiles Using t-Digests
- Robust unsupervised domain adaptation for neural networks via moment alignment
- A Demand-Response Framework in Balance Groups through Direct Battery-Storage Control
- Can we Predict Performance Events with Time Series Data from Monitoring Multiple Systems?
- A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment
- Visual Scene Understanding for Autonomous Driving Using Semantic Segmentation
- RUDDER: Return Decomposition for Delayed Rewards
- Explaining and Interpreting LSTMs
- A Constraint Mining Approach to Support Monitoring Cyber-Physical Systems
- Comparing Constraints Mined From Execution Logs to Understand Software Evolution
- Using Constraint Mining to Analyze Software Development Processes
- Supporting the Selection of Constraints for Requirements Monitoring from Automatically Mined Constraint Candidates
- Multi-source transfer learning of time series in cyclical manufacturing
- MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking
- ProbMinHash - A Class of Locality-Sensitive Hash Algorithms for the (Probability) Jaccard Similarity
- Verifying temporal specifications of Java programs
- Align-RUDDER: Learning From Few Demonstrations by Reward Redistribution
- Convergence Proof for Actor-Critic Methods Applied to PPO and RUDDER
- Cost Optimization at Early Stages of Design Using Deep Reinforcement Learning
- Real-Time Reconnaissance Detection for Web Applications
- Estimation from Partially Sampled Distributed Traces
- Computing the Similarity Estimate Using Approximate Memory
- Leveraging model-driven technologies for JSON artefacts: the shipyard case study
- Understanding the Effects of Dataset Characteristics on Offline Reinforcement Learning
- SetSketch: Filling the Gap between MinHash and HyperLogLog
- Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires
- Rapid Prototyping for Microarchitectural Attacks
- Context-Aware Security Intelligence of Vulnerability Scanners in Cloud-native Environments
- Open Source
- Projects & Standards
- Open Source Projects
- OpenTelemetry Collector Contrib
- Dynatrace OpenTelemetry Metrics Exporter for Java
- Dynatrace OpenTelemetry Metrics Exporter for .NET
- Dynatrace OpenTelemetry Metrics Exporter for Python
- Dynatrace OpenTelemetry Metrics Exporter for JavaScript
- Dynatrace OpenTelemetry Metrics Exporter for Go
- fluent-plugin-dynatrace, a plugin for fluentd
- Telegraf
- Dynatrace GCP function
- Dynatrace GitHub Action
- Dynatrace metric utils java
- Kached properties
- Logstash Plugin
- Dynatrace AWS Log Forwarder
- Dynatrace Backend listener plugin for JMeter
- Dynatrace Metadata provider for Log4j
- Dynatrace Terraform Provider
- Dynatrace developer's toolbox
- Dynatrace Dashboard PowerUps
- NetTracer
- Dynatrace Python API Client
- Junit jupiter OpenTelemetry extension
- OneAgent SDK Python AutoInstrumentation
- Dynatrace PTC Windchill Starter Set
- Dynatrace metric utils python
- BizOpsConfigurator
- Blog
- A giant leap for the design system at Dynatrace
- A running start towards enablement: how a UX guild will broaden our horizons
- Owning the unknown
- Correlating distributed traces of large scale systems
- Optimizing Spark queries with filter pushdown
- Terminology matters
- Cloud-native app delivery, where we’re heading in 2021
- Summarizing high-frequency latency measurements with strict error guarantees
- How online innovation days brought our remote labs closer together
- Shifting SRE Left with Keptn
- Improving processes and workflows, one idea at a time
- “We aim to find a common language”
- What goes into becoming the best IT employer in Austria
- Understanding Black-Box ML Models with Explainable AI
- How NOT to start with Kubernetes
- Inside Open Source: meet the contributors working on OpenTelemetry
- How Dynatrace does Scaled Agile. Part 1: Choosing the right framework
- Implementing Agile project management in an open-source project
- A Deep Learning Approach for Network Anomaly Detection
- 5 Takeaways from talking about performance engineering with Taras Tsugrii from Facebook
- Meet the Kotlin community at Dynatrace
- Why I decided to join Dynatrace, the leading company that is continuously innovating
- Doping for the Internet
- Empowering Dynatrace employees with the Autonomy Principle
- How to Be a (Good) DevOps Engineer
- User Testing vs Usability Testing
- How Dynatrace does Scaled Agile. Part 2: Lessons learned from implementing a new framework
- Data-Driven Product Management
- The SRE minstrel, singing his way to reliable systems
- What is Product Led Growth
- Insights from a Java software engineer in Graz
- We cannot afford to overlook brainwaves
- Why your next tech conference should be company-internal
- 5 tips to a successful company-internal tech conference
- On the topic of data-driven product design and growth product management
- Incidents are the new normal
- The Rise of Intelligent Observability in Software Development
- Life of an open-source product owner at Dynatrace
- InnerSource: What can it do for you?
- A primer on testing React apps with React Testing Library
- What’s it like to build a prime user experience at Dynatrace
- How to combine and automate infrastructure and application deployment in a microservice environment
- How we are redesigning our microservices deployment strategy
- From software startup to global player: how customer value shapes your organization
- Making cloud-native apps more secure as a researcher at Dynatrace
- Instrumenting Keptn with OpenTelemetry
- Partial trace sampling: a new approach to distributed trace sampling
- What is the future of work at Dynatrace?
- Why our development teams don’t use microservice frameworks
- Balancing software engineering and writing a master thesis
- Being at the front-end of development in Barcelona
- A tool to execute them all: the Job Executor Service
- What it means to be a Team Captain in software development
- Tips from the trenches of performance engineering
- Creating a JUnit extension for tracing tests with OpenTelemetry
- Why Dynatrace is investing in open-source software development
- 2021 Recap: Lessons learned from continuous growth
- From Dev to PO: balancing technical excellence and customer value
- My first months at Dynatrace, from Graz to Gdansk and then Linz
- Releasing Keptn at the click of a button
- From test automation to security: my career at Dynatrace
- The most in demand tech skills in 2022
- From Women in Tech to Women in Tech
- 5 women leaders in tech share their best advice
- Java developer by day, software enthusiast by night
- It’s not about the data, but what you do with the data.
- Supporting displaced students in Linz
- Kubernetes Security Best Practices -Part 1: Role Based Access Control (RBAC)
- Not just another remote company
- Kickstarting CI Best Practices in Autonomous Teams
- Lessons learned for performance engineering in hybrid cloud (Azure, AWS, Google …)
- From ‘you shall not pass’ to ‘the pass is here’ .
- Why do you need a sprint goal?
- My life as a full stack developer at Dynatrace
- Labs
- Jobs
- Contact