Bevorzugen Sie Deutsch? Einige Artikel und mehr über mich gibt es auch in meiner Muttersprache.

Today, any device is networked, not only our personal devices, but anything from the fridge to the power plant. This implies endless possibilities, but also possibilities galore for anything to go wrong. Decades of thorough theoretical and hands-on experience enables me to guide you toward the right solution for anything networked. Learn more…

Recent technical essays

  • Kensington PowerPointer for Linux LibreOffice
    Navigating the slides works perfectly with the Kensington PowerPointer for LibreOffice under Linux, no questions asked. The extra functions (“laserpointing”, drawing, and screen blanking) are not well supported. Here is how to fix them.
  • NFTs are unethical
    As an avid reader, you know my arguments that neither NFT nor smart contracts live up to their promises, and that the blockchain underneath is also more fragile and has a worse cost-benefit ratio than most believe. Similarly, I also… Read more: NFTs are unethical
  • Inefficiency is bliss (sometimes)
    Bureaucracy and inefficiency are frowned upon, often rightly so. But they also have their good sides: Properly applied, they ensure reliability and legal certainty. Blockchain disciples want to “improve” bureaucracy-ridden processes, but achieve the opposite. Two examples:
  • How to block AI crawlers with robots.txt [5 Updates, 2023-11-04]
    If you wanted your web page excluded from being crawled or indexed by search engines and other robots, robots.txt was your tool of choice, with some additional stuff like <meta name=”robots” value=”noindex” /> or <a href=”…” rel=”nofollow”> sprinkled in. It… Read more: How to block AI crawlers with robots.txt [5 Updates, 2023-11-04]
  • «Right to be Forgotten» void with AI?
    In a recent discussion, it became apparent that «unlearning» is not something machine learning models can easily do. So what does this mean to laws like the EU «Right to be Forgotten»?
  • Post Quantum and Homomorphic Encryption made easy
    Major challenges in computer and information security are the advent of quantum computers and the need to trust your data to (cloud) service providers. New cryptography is supposed to help, but they look daunting. At their core, however, they are… Read more: Post Quantum and Homomorphic Encryption made easy
  • How does ChatGPT work, actually?
    ChatGPT is arguably the most powerful artificial intelligence language model currently available. We take a behind-the-scenes look at how the “large language model” GPT-3 and ChatGPT, which is based on it, work.
  • Identifying AI art
    AI art is on the rise, both in terms of quality and quantity. It (unfortunately) lies in human nature to market some of that as genuine art. Here are some signs that can help identifying AI art.

All blog posts…

Let’s stay in touch!

Receive a mail whenever I publish a new post.

About 1-2 Mails per month, no Spam.



Apache (4) Blockchain (17) Cloud Storage (11) Data Protection (5) Denial of Service (8) DNS (11) DNS-SD (6) DNSSEC (6) Fast Routers (20) Federated Services (6) Forwarding Lookups (4) FPGA (4) Hash Tables (8) Identity Management (6) Internet of Things (8) Intrusion Detection (6) JSXC (10) Linux (19) Mac OS X (5) Mobile Networks (7) MPLS (4) Multicast (15) NAT traversal (4) Network Processors (4) NTP (6) NTS (6) Opportunistic Networks (9) Peer-to-Peer (23) Privacy (16) Quality of Service (9) Replication (4) Security (51) Service Discovery (5) Social Networks (8) Timestamps (6) TLS Interposer (6) Traffic Engineering (9) Trust (8) Ubuntu (7) Usability (6) Web Applications (11) WISEchat (5) XML (8) XMPP (11) Zeroconf (6)