Welcome to my blog. This is mainly about IT, information management and Cyber Security with occasional forays into general technology, science and maybe even politics and beliefs.
You may find quite a few errors and formatting issues right now. That’s because I’ve just moved from a self-hosted WordPress blog to a cloud hosted Hugo blog. I’m still sorting out the finer details. Please use the contact form if you spot anything.
Latest posts and knowledgebase articles
JSONata is a syntax designed by IBM to help reformat and restructure JSON data in a similar vein to the way that XLST is used to transform XML data.
Drayton are a very widely used manufacturer of heating controls. They make the “Wiser” control system which is low cost and easily fitted. This article shows you how to use Node-RED to query and control the system.
Microsoft have announced the deprecation of the desktop version of OneNote. They claim that the Windows Store version is as good or better. But it really isn’t! Here I try to list the missing features. I will update this post as things change.
📖 About | 📎None | 🔖None
Search this site using Google Site Search.
Note that targeted advertising is turned off for greater privacy.
📖 Kb | 📎None | 🔖None
I occasionally find the need to try and work out what technology I used when, this page is a rather belated effort at capturing some of that information.
Hugo is still changing very quickly. So it is helpful to be able to easily download and install the latest version directly from GitHub.
The May 2018 version of Windows 10 has an updated alt-tab view called the timeline. While it will eventually be more useful, its current implementation is poor.
I am sure that whoever in Microsoft came up with the idea of an autosave flag, they thought it was a great idea. And indeed it is. However, when they made it default to on, they made a logistical nightmare for the majority of users. This post discusses why and what you could do about it.
Having just brought a Google Home, I’ve quickly realised that, although Google are supposedly fairly open about allowing people to develop for it, there are still far too many limitations. To try and get round these, I’ve been looking at automation tools. In this article, I will list some of the key tools and their strengths and weaknesses.
📖 Posts | 📎 Blogging, Development | 🔖 security, security threats, threat management, vulnerabilities, web