Posts

The Sovereignty Bluff: Why We Are Tenants in Our Own Business

Image
Executive Summary: The Risk: We have legal ownership of our cloud data, but no operational possession. If a vendor locks us out, we stop functioning. The Compliance Gap: Current SaaS backups likely fail DORA/NIS2 requirements because they cannot be restored without the vendor's cooperation. The Solution: A "Lifeboat Architecture" that keeps a neutral, vendor-independent copy of critical data, allowing you to operate a "Minimum Viable Company" during a crisis. We celebrate our "Cloud First" strategies and lull ourselves into a false sense of security because our contracts guarantee us "ownership" of the data. But when the plug is pulled — whether by technical outages, geopolitical tensions, or a simple blocked credit card — the brutal truth is revealed: We have ownership, but we do n...

No Export Button? No Problem. How I Used Cursor AI to Break Vendor Lock-in (Harvest Backup Tool)

Image
(Joint publishing with my work blog at tkt.dev ) Do you use SaaS Tools? I'd be surprised if not. How many of your SaaS tools provide you an automated full backup of your own data? Probably few to none. Do you want to have a backup or export of your own data? Yes, probably you do (and I want to have that for sure!). In the past, the conversation was over at this point. The SaaS vendor in question doesn't provide an automated backup or export for our data, and that is it. The reason for our capitulation in face of the sad facts is that creating a backup tool for every single SaaS vendor we use was simply way too expensive and not feasible. Today, with the friendly help of LLMs and vibe coding, the conversation is not over and we can simply help ourselves. Many SaaS offerings do have APIs and grant low-level access to our data, they just didn't bother to implement a backup and restore function. For LLMs, create a tool to download all data via ...

Self-Service Event Sign-Up with Google Forms and Google Calendar

Image
What is the most simple way for letting people sign themselves up to a Google Calendar event? Just a few clicks with my new Google Forms Event Sign-Up add-on : 📆 Create an event in Google Calendar 🗒️ Create a new Google Form that collects email addresses 🔗 Connect the Google Form to the event in the calendar via the Event Sign-Up add-on 📢 Publish 🤵 Every respondent of the Google Form will be added as a participant and receive a calendar invite to the event ✅ Self-service event sign-up The add-on adds a configuration dialogue to Google Forms that let's you select a calendar and event to connect to this form: A quick demo of how to use it: Why Yet Another Tool? First of all, I like creating tools! Also, while there are other options available, they all lack 2 main requirements for me: Minimal permissions on my data to limit the risk of exploitation For free and preferably Open Source  After carefully ...

Automated SOPS compliance checking with sops-check

Image
SOPS is the de-facto standard for securely storing secrets in Git repositories. It creates encrypted containers that protect the secret content. The containers are in YAML, JSON, ENV or INI format so that the regular Git operations and line-based diffs still work. Also, SOPS only encrypts the values of the secrets so that it is easy to see the purpose of a secret. SOPS files use external "trust anchors" for key material so that the ability to decrypt a SOPS file depends on the access to the appropriate decryption key or service. While SOPS files are considered secure by themselves, the security posture actually depends entirely on protecting these external trust anchors - and on controlling the trust anchors added to a SOPS file . SOPS files are often used with cloud-based key management systems (KMS), which has the great advantage of providing an online identity verification  prior to granting access to the encrypted data. A malicious actor — espe...

Static Website Authentication with Magic Link Made Easy

Image
Following up on A Login Security Architecture Without Passwords I recently had the opportunity to try out how easy it is to actually implement the "no password" login architecture. The problem to solve was publishing a small static website (an online conference program) to be accessible by several hundred people, of whom we only have the email address (that they used to sign up for the event). The event is private and the program should therefore also not be published to the open Internet, but stay private. In this example the conference program was a custom built website published via static website hosting. The code and more information on how to get started is published at github.com/schlomo/static-website-with-magic-link-auth Problem Analysis Magic link authentication (get a link via email to log in instead of bothering with a password) is in my humble and honest opinion the best — if not only — solution for this probl...

Univention Summit 2025 - A Status Update on Open Source Workplace Tech

Image
Last week, I attended the Univention Summit 2025 in Bremen , and it was a very pleasant surprise. I didn’t expect much, and it turned out to be an event with about 750 participants and a lot of interesting talks and vendors to meet. In the shadow of Microsoft 365 and Google Workspace , there is a vibrant and active community of companies, government agencies and schools who use OX App Suite , Nextcloud , Opentalk , Samba and even Linux Desktops, to name just a few. Univention’s own UCS ( Univention Corporate Serve r) also serves as the core of the internet IT setup for many organizations who don’t want to run a Microsoft Active Directory , or it complements it with additional functionality. One of the big news items that everybody talked about was of course the foundation of Opencloud , a spin-off based on Owncloud , by Peer Heinlein . I can only hope that this will ensure the continued success of Open Source file sharing and collaboration solutions. Let me share some personal hig...

Bitkom Forum Open Source 2024 in Erfurt

Image
Triggered by a provocative announcement for their The Cuckoo in the Tendering Process: When the vendor loses to itself panel discussion by Peer Heinlein  ( Heinlein Support ) and Johannes Loxen  ( Sernet ) on LinkedIn, I attended the 10th Bitkom Open Source Forum  in Erfurt . This free one-day conference on open source in a business context has become a highly informative event - that is well worth attending. This year's motto of  The future of open source - fair, regulated, intelligent was exactly what I needed at the moment, and I spent the whole day in the Open Source - regulated  track. Cockoo or What Is My Business Model? The panel discussion was about the challenges Peer faces in marketing OpenTalk , the open source videoconferencing software that Heinlein Support has developed over the last few years. Competitors seem to be offering OpenTalk hosting packages in public tenders, even though they don't contribute to the code or fix bugs. In the end, Peer c...

DevOps Driving School - Explaining DevOps in 5 Minutes

Image
DevOps is not a title, not a box to buy, nor a software to install - how can you explain DevOps in 5 minutes, e.g. as an elevator pitch riding up to the top floor with your boss? DevOps is like a driving license for running code in production In my opinion, this is the easiest and best explanation, that everybody can understand. Specifically, it is like a motorcycle driving license and this analogy carries surprisingly far, e.g.: motorcyclists pass a theoretical exam → Engineers should know about their obligations before working in production motorcyclists drive on their own, the instructor drives behind and gives instructions via radio → Engineers should work in production and a DevOps coach should accompany them with expertise motorcyclists are fully accountable for their mistakes (e.g. hitting a tree) while they learn driving → Engineers working in production are fully acc...

My Magic Zebra Printer - Why Software Rules the World

Image
Software rules the world, and everybody is its subject. But you can be a ruler, too - if you like  I keep telling my family. Here is a little example where I try to rule my secondary printer by automating the tedious task of rotating and scaling content to print. My Little Zebra Printer My secondary printer (shown here on the shelf in my home office) is a little miracle device: It is a thermal transfer receipt printer , that prints on a roll of continuous paper that is 10cm (4in) wide. Specifically a Zebra GX420d . You can get such a used printers relatively cheap. This is exactly a printer like you know from your local supermarket. And it is a super useful tool to have at home, as many print jobs don't require a full A4 page and don't need to be printed on fancy bright white paper with ever-lasting toner. Most common print jobs are shipping labels (no need to cut them to size), small shopping lists (fits in a pocket), little notes to stick into a book (e.g. reading order for ...
Like this content? You could send me something from my Amazon Wishlist. Need commercial support? Contact me for Consulting Services.