Recent
The Senior Specialist's Tax: Hands-on or Handcuffed?
·428 words·3 mins
Exploring the hidden workload, compliance mirages and burnout risks faced by senior specialists in enterprise IT environments.
Fortinet’s Quiet War on Linux Workstations
·430 words·3 mins
How Fortinet’s licensing changes force Linux engineers into costly VPN workarounds, creating operational risk.
If You Can Read It in OWA, You Can Archive It: A Playwright Approach
·1176 words·6 mins
The ISO 27001 Hallucination: Documenting Your Way to Disaster
·1163 words·6 mins
ISO 27001 documentation can give a false sense of security, leading to compliance illusions and enterprise risk.
The Death of the Architect: How AI Hijacks the Technical Soul
·1402 words·7 mins
Efficiency is not a Flex: Beyond the 'I Use Arch, BTW' Meme
·416 words·2 mins
Using Arch Linux isn’t inherently more efficient — here’s why tech efficiency is about practices, not distro choice.
The Apeldoorn Illusion: A Post-Mortem of Dutch Digital Sovereignty
·790 words·4 mins
A post-mortem of Dutch digital sovereignty failures, exploring enterprise and systemic IT accountability.
The DJI and AP Collapse: A Masterclass in Institutional Hypocrisy
·334 words·2 mins
A case study of institutional failures in cybersecurity and governance, highlighting systemic risks in enterprise IT.
The Badge, The Burnout, and the Backdoor: Why Scammers Love Your CISO
·639 words·3 mins
How burnout and gamification create easy targets for social engineering attacks on enterprise admins.
The Digital Trump Moment: The Bill for Our Collective Negligence Is Due
·1080 words·6 mins
How collective IT negligence and geopolitical decisions expose systemic risks in digital sovereignty.
The State of SSH: Neglect Disguised as Stability
·740 words·4 mins
SSH infrastructure is often treated as stable, but neglect can create hidden vulnerabilities in enterprise environments.
Digital Vassals: Why the EU’s Big Mouth Is a Suicide Note
·347 words·2 mins
How EU policies, digital sovereignty, and cloud dependencies put member states at systemic risk.
If Digital Autonomy Feels Like an Attack, What Does That Say About Dependency?
·623 words·3 mins
The Death of the 'Windows Default' and the Rise of Technical Sanity
·990 words·5 mins
The Dutch Government's New Vision on Digital Autonomy: Promises, Contradictions, and the Same Old Dependencies
·684 words·4 mins
The Dutch government’s digital autonomy strategy promises independence but risks reinforcing old dependencies.
Switzerland’s First Domino: Are We Finally Heading Toward Real Digital Sovereignty?
·743 words·4 mins
The Panopticon Economy: How the EU is Building China-Lite
·638 words·3 mins
Cloudflare Fell Over And Everyone Built on Top of It Too
·1002 words·5 mins
Cloudflare, AWS, and Azure outages show that centralized dependency risks affect modern infrastructure.
VMware Is Dead: Broadcom Killed Operational Trust. Now, We Build Our Own Stack.
·1142 words·6 mins
Content Theft on LinkedIn: A Professional Problem Worth Addressing
·920 words·5 mins
Hands-On AI Prompt Engineering for Sysadmins
·640 words·4 mins
Practical AI prompt frameworks and examples for sysadmins and tech professionals to generate actionable repeatable results.
The Exit That Never Was: ISO27001, the Dutch Government, and the Solvinity Panic
·597 words·3 mins
Who Really Owns the Student Laptop? A Critical Look at Duty of Care vs. Ownership
·750 words·4 mins
The Dutch Kill Switch: Kyndryl, Solvinity, and the Sovereignty Mirage
·825 words·4 mins
Target Acquired: When WSUS Becomes the Weapon (CVE-2025-59287)
·641 words·4 mins
Inception-Level Evasion: When Your EDR Can’t See the Linux VM Hiding in Windows
·1114 words·6 mins
Pro-Russian hackers exploit Linux VMs inside Windows to bypass EDR, creating a critical security blind spot.
Hands-On or Handcuffed: An Engineer's Choice
·857 words·5 mins
A reflection on engineering integrity versus corporate bureaucracy and the commitment to remain hands-on.
The EU's Digital Overreach: CBDC & Chat Control - Convenience for Whom?
·781 words·4 mins
The EU’s digital initiatives like CBDC and Chat Control raise questions about privacy, control, and IT workload.
From Sysadmin to CISO: The Complete Hell of IT Specialism
·559 words·3 mins
When the Cloud Falls, the World Trembles
·602 words·3 mins