Things I build, break, fix, and write about

20 April 2026
Tagging and storing classic car data in a self-hosted

A self-hosted inventory tracker only behaves if the data model stays boring, and boring is exactly what I want when I am digging out chassis numbers at 2 a.m. Keep the tags tight, the notes plain, and the attachments where you can actually restore them.

20 April 2026
Weekly Tech Digest | 20 Apr 2026

Stay updated with the latest in tech! This digest covers AI ethics, auto industry shifts, and the impact of politics on technology, exploring today's...

20 April 2026
Security Advisory – 18 Apr 2026

Daily security advisory summary for 18 Apr 2026

19 April 2026
Sport bike power draw: battery backup planning for garages

A fast bike review can turn into a useful smart home power and noise checklist if you stop guessing and measure the garage properly. I prefer that to...

Latest blog posts you might like

4 February 2026
Weekly Tech Digest | 04 Feb 2026

Stay updated with the latest in tech! This digest covers AI ethics, auto industry shifts, and the impact of politics on technology, exploring today's pressing issues.

4 February 2026
Mitigating privilege escalation risks in Cisco Intersight

Explore the risks of privilege escalation in Cisco Intersight following CVE-2026-20092. Learn essential steps to secure your appliance and mitigate vulnerabilities effectively.

3 February 2026
Mitigating XSS vulnerabilities in Cisco Packaged CCE

XSS vulnerabilities in Cisco's Contact Centres pose serious risks. Understanding CVE-2026-20055 and CVE-2026-20109 is vital for prioritising effective security measures.

2 February 2026
Amazon Fire TV Stick 4K Plus and 2 more Amazon tech bargains

Discover the Amazon Fire TV Stick 4K Plus and two more tech deals this week.

2 February 2026
Understanding Cisco vulnerabilities: CVE-2026-20045

Discover essential strategies for managing the critical Cisco CVE-2026-20045 vulnerability. Learn how to secure Unified Communications systems effectively and minimise risks.

1 February 2026
Mitigation strategies for SSH Denial of Service attacks

Secure your homelab by mitigating SSH Denial of Service risks. Discover practical steps to enhance SSH configuration and implement effective network controls today.

1 February 2026
Leveraging cloud services for AI integration

Unlocking AI adoption for IT teams is essential for staying competitive. Discover practical strategies for leveraging cloud services, reskilling, and automating tasks effectively.

31 January 2026
Ransomware lessons from the Luxshare Precision breach

The Luxshare incident highlights urgent vulnerabilities in Supply Chain Security. Learn how ransomware threats can compromise sensitive data and what actions to take now.

31 January 2026
Automation strategies for effective AI integration

Discover how to effectively integrate AI into your homelab by following a systematic approach, ensuring reliability while protecting existing services.

30 January 2026
Understanding the barriers to effective AI deployment

Unlock the potential of AI in your business with this essential guide. Discover common pitfalls, effective fixes, and strategies for maximising ROI from AI investments.