Over the last 15 years (!) I have used Text-to-Speech (TTS) systems for various projects including a fairly elaborate home automation system,1 a distributed public announcement system and a monitoring system.2| calbryant.uk
Over the last 15 years (!) I have used Text-to-Speech (TTS) systems for various projects including a fairly elaborate home automation system,1 a distributed public announcement system and a monitoring system.2| calbryant.uk
Automating the processes of splitting up large 3D prints into smaller parts with dovetail joins| calbryant.uk
I recently upgraded from a Ryzen 3700X to a 5950X. Double the cores, and nearly double the potential heat output. I didn’t upgrade my cooling solution, a 240mm Kraken X53 AIO liquid cooler.| calbryant.uk
I have a cable broadband connection at home. It’s actually reliable, which is refreshing compared to the poor experience had with the same provider as a student living in Leicester.| calbryant.uk
Have you ever run a destructive command on the wrong server? The year was 2010; I had 3 servers that I maintained with a few friends. We developed a script that would destroy a given server over SSH – it would write random data to block devices and kmem, after deleting a lot of files.| calbryant.uk
A few years ago I developed a few clever ways of rackmounting non-rackmount equipment so it could look neat in my HiFi rack enclosure.1 The goal was to have a professional-looking setup that would support input from my TV, spotify, Airplay, DJ controller and other sources while being able to drive a subwoofer with room correction and integrated crossover.| calbryant.uk
I’ve been using a set of Yubikeys for some time now, not just for 2FA but for SSH authentication, remote code signing and password storage too. It’s worked so well (and required such significant effort to get working) that I thought I’d write about how I did it and what makes my approach secure.| calbryant.uk