Overview of data evaluation pipeline

Evaluating a cheminformatics dataset - Part 1: An ML engineering and DevOps showcase

So far, my career path led me from analytical chemistry to data science, where I gained further experience in ML engineering, DevOps, and software engineering. In the first part of this showcase series I want to focus on the ML engineering and DevOps part of evaluating a cheminformatics dataset, where we will dive deeper into the following topics: Understanding the dataset/the problem Developing an extract, load, transform (ELT) workflow Train, validate, and test machine learning (ML) models Transferring the ELT workflow and ML processes into robust and scalable pipelines Explore real-world production scenarios In the second part of this showcase series, which will be released later in a separate article, we will focus on the software engineering aspect. In general, we will follow a top-down approach when going through this showcase, meaning that we are creating a complete running workflow first, with a focus on the orchestration and selection of tools. Therefore, we will only see some high-level code snippets in this first part of my showcase series. In the second part (released as a separate article in future) we will dive deeper into the codebase and explore software engineering best practices like creating clean and maintainable code, following test-driven design principles and establishing a proper software lifecycle. ...

January 8, 2026 · 29 min
Successful blocking malicious login attempts

Hardening a public Synology DSM login using Nginx and CrowdSec

Roughly two months ago we set up a reverse proxy for a Synology NAS, what was described in this article, to make Synology NAS services available to users outside my private network. But since we didn’t want to use a VPN solution, to not bother our users with another login layer, we went the route of making the Synology DSM login accessible to the public. But like any other public service out there it’s now subject to the usual requests from web crawlers, -scanners or bot networks. These bots are constantly screening the whole web and are trying to access common APIs, files etc., that are usually found on public web servers. These are non-targeted attacks and are not a problem with proper security in place. ...

January 2, 2026 · 9 min
Shelly Plus Smoke Alarm and Ubiquiti Unifi U6 Pro

Fixing IoT device connection issues with Unifi access points

Nowadays, our home WiFi networks need to reach not only a few computers or phones, but also a variety of smart-home or IoT devices in general, like thermostats, smoke alarms, bulbs, window sensors, you name it. Most of these devices have one thing in common: Their WiFi capabilities are limited compared to regular computers or phones. While some devices work out-of-the-box with some WiFi routers, some combinations of IoT devices and routers/access points just don’t work and need some configuration. ...

November 9, 2025 · 7 min
Synology DS224+

Operate Synology NAS with Drive and Photos behind Nginx reverse proxy on a VPS [Full Guide November 2025]

Operating a Synology NAS behind a VPS as a reverse proxy provides speed, security, and hassle-free access for users of your private cloud. In this article I will guide you through the complete process of: setting up a virtual private server (VPS) configuring nginx as the reverse proxy for Synology Drive and Synology Photos, obtaining Let’s Encrypt SSL certificates for secured connections to your VPS with a custom domain implementing VPS security measures making everything ready to run independently with minimal or no maintenance If you want to skip the introduction just jump directly in to the guide: Guide Part 1. ...

November 3, 2025 · 30 min