Recent
The Senior Specialist's Tax: Hands-on or Handcuffed?
·426 words
Exploring the hidden workload, compliance mirages and burnout risks faced by senior specialists in enterprise IT environments.
Fortinet’s Quiet War on Linux Workstations
·430 words
How Fortinet’s licensing changes force Linux engineers into costly VPN workarounds, creating operational risk.
If You Can Read It in OWA, You Can Archive It: A Playwright Approach
·1176 words
The ISO 27001 Hallucination: Documenting Your Way to Disaster
·1163 words
ISO 27001 documentation can give a false sense of security, leading to compliance illusions and enterprise risk.
The Death of the Architect: How AI Hijacks the Technical Soul
·1402 words
Efficiency is not a Flex: Beyond the 'I Use Arch, BTW' Meme
·416 words
Using Arch Linux isn’t inherently more efficient — here’s why tech efficiency is about practices, not distro choice.
The Apeldoorn Illusion: A Post-Mortem of Dutch Digital Sovereignty
·790 words
A post-mortem of Dutch digital sovereignty failures, exploring enterprise and systemic IT accountability.
The DJI and AP Collapse: A Masterclass in Institutional Hypocrisy
·334 words
A case study of institutional failures in cybersecurity and governance, highlighting systemic risks in enterprise IT.
The Badge, The Burnout, and the Backdoor: Why Scammers Love Your CISO
·639 words
How burnout and gamification create easy targets for social engineering attacks on enterprise admins.
The Digital Trump Moment: The Bill for Our Collective Negligence Is Due
·1080 words
How collective IT negligence and geopolitical decisions expose systemic risks in digital sovereignty.
The State of SSH: Neglect Disguised as Stability
·740 words
SSH infrastructure is often treated as stable, but neglect can create hidden vulnerabilities in enterprise environments.
Digital Vassals: Why the EU’s Big Mouth Is a Suicide Note
·347 words
How EU policies, digital sovereignty, and cloud dependencies put member states at systemic risk.
If Digital Autonomy Feels Like an Attack, What Does That Say About Dependency?
·623 words
The Death of the 'Windows Default' and the Rise of Technical Sanity
·990 words
The Dutch Government's New Vision on Digital Autonomy: Promises, Contradictions, and the Same Old Dependencies
·684 words
The Dutch government’s digital autonomy strategy promises independence but risks reinforcing old dependencies.
Switzerland’s First Domino: Are We Finally Heading Toward Real Digital Sovereignty?
·743 words
The Panopticon Economy: How the EU is Building China-Lite
·638 words
Cloudflare Fell Over And Everyone Built on Top of It Too
·1002 words
Cloudflare, AWS, and Azure outages show that centralized dependency risks affect modern infrastructure.
VMware Is Dead: Broadcom Killed Operational Trust. Now, We Build Our Own Stack.
·1142 words
Content Theft on LinkedIn: A Professional Problem Worth Addressing
·920 words
Hands-On AI Prompt Engineering for Sysadmins
·640 words
Practical AI prompt frameworks and examples for sysadmins and tech professionals to generate actionable repeatable results.
The Exit That Never Was: ISO27001, the Dutch Government, and the Solvinity Panic
·597 words
Who Really Owns the Student Laptop? A Critical Look at Duty of Care vs. Ownership
·750 words
The Dutch Kill Switch: Kyndryl, Solvinity, and the Sovereignty Mirage
·825 words
Target Acquired: When WSUS Becomes the Weapon (CVE-2025-59287)
·641 words
Inception-Level Evasion: When Your EDR Can’t See the Linux VM Hiding in Windows
·1114 words
Pro-Russian hackers exploit Linux VMs inside Windows to bypass EDR, creating a critical security blind spot.
Hands-On or Handcuffed: An Engineer's Choice
·857 words
A reflection on engineering integrity versus corporate bureaucracy and the commitment to remain hands-on.
The EU's Digital Overreach: CBDC & Chat Control - Convenience for Whom?
·781 words
The EU’s digital initiatives like CBDC and Chat Control raise questions about privacy, control, and IT workload.
From Sysadmin to CISO: The Complete Hell of IT Specialism
·559 words
When the Cloud Falls, the World Trembles
·602 words