1. Wegwerfadressen

    Eine interessante Studie ist noch eine Eingabe weit weg: E-Mail-Adresse. Jemand bietet etwas zum Download an, aber erst registrieren. Für einen Verkauf braucht man eine elektronische Kontaktmöglichkeit, am einfachsten ist E-Mail. Doch nur eine Adresse ist praktikabel. Was wäre, wenn die eine Adresse viele Gesichter haben kann? More…

  2. Ausdrucken nur über LyX

    Manchmal unterhalte ich mich anderen über die kleinen Ärgernisse der Informationstechnik. Das hat auch schonmal einen Briefumschlag als Auslöser. Meine Umschläge haben nämlich grundsätzlich ein Sichtfenster. Mein Gegenüber wollte wissen, wie ich die Adresse so genau aufs Papier bekomme, dass sie im Fenster sichtbar ist. More…

  3. Something I have

    As an IT professional I have to deal with many different systems and platforms. I run some servers myself and I use different mail addresses. In addition I sign software packages as well as e-mail. There's also a lot of encryption going on. Without a keystore I'd be lost. There is a plethora of passwords, not only to access something but also to unlock encryption- or signing keys. More…

    Usecases of a Yubikey, October 2019 in Security
  4. Muzzle for free

    Not yet translated More…

    Being allowed to write and making use of this privilege, June 2019 in Outer World
  5. A matter for the boss

    Not yet translated More…

  6. Gentoo

    I've tried many Linux distributions, from early Mandrake to free SuSE and ran Gentoo for many years since its early days. Then I shifted my priorities from building packages to having a life. Recently I returned to Gentoo with a strategy and clear motivation: no clutter, no Canonical and no systemd. After half a year I'm up and running again. A big desktop machine works from time to time through the large tasks requiring processing power. For everyday work I use a laptop, Lenovo G505s and a mini-ITX platform hosts all the important services like a backup RAID, web server, file/ media server and databases (SQLite, PostGreSQL), Gentoo binary package host. The following paragraphs outline the foundation of my motivation, to invest a little more time again, now more efficiently. More…

  7. Make it a virtual problem

    It started two years ago when nearly everybody in my near surrounding working as an IT expert was burning for Docker, containers, virtualization, clustering and all that fancy stuff with Netflix-, Amazon or Google-cloud foundation. It was back in 2015 when I had first contact with IBM Bluemix Garage and the new craze Ionic and/ or AngularJS. Until then I was a heavy weight champion of JEE development with an application server running 50-100 servlets at once. Now I sat with two guys in my office and tried to port the important parts of a few servlets to the new platform – check if it works out and estimate transition cost. More…

  8. Share Credentials The Safe Way

    Companies sometimes need shared credentials. You need to access a customer's testing system, log in to a sample cloud instance or exchange work in progress from developer accounts. These systems are password protected and normally you have a shared document, a Wiki or a mailing list. It has never been a good idea to share passwords this way. Once you saved the credentials access is unlimited. More…

  9. Linux is an Alternative

    That's a pure hypothesis and includes Scientism (Asimov). Linux is not a clearly bounded object. First step of every scientific inquisition of Linux users is to ask, which distribution they use or more formal: who is your god? One could dive even deeper and is absolutely right when saying a distribution is not Linux but uses Linux. Some are real priests of open source software and were put together from patches of kernel code. More…

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6