
Thoughts and ideas on how to build tools, automate workflows and speed-up the workplace.
More and more teams are prioritizing open-source workflow management tools to power their internal processes. Balancing the ever-growing need for efficiency with security and other operational factors like vendor lock-in often means that open-source is the preferable option, especially in larger organizations handling mission-critical workflows. At the same time, this is a fast-evolving space, with the rise of AI rapidly transforming the way that businesses handle all kinds of workflows.
Ronan McQuillan
Jan 13, 2026
The EU public sector has been actively trying to break away from US Tech, as part its movement towards digital sovereignty. Global geopolitical turbulence has accelerated the movement over the last year. The risk of non-sovereign dependence on technology was brought to the forefront last month as the US digitally sanctioned six judges and three prosecutors, rendering them unable to use services that we take for granted in our personal lives.
Michael Shanks
Dec 15, 2025
n8n is perhaps the best-known open-source platform for automating tasks and workflows. It’s hugely popular with technical teams, offering a combination of intuitive visual development tools and optional custom code. However, n8n isn’t the only platform in this space. In fact, there are several vendors in the workflow management market, offering distinct approaches to enabling different kinds of users to automate tasks. Today, we’re diving deep into the market for n8n alternatives.
Ronan McQuillan
Dec 11, 2025
The ongoing rise of AI is quickly transforming the landscape of internal IT. On the one hand, this has introduced huge opportunities for efficiency, reliability, and other benefits within internal workflows. On the other hand, it also introduces major challenges. Today, we’re diving deep into one of the most prominent of these, as we explore AI access control. In particular, we’re going to be examining how to balance the efficiency gains of agentic AI with retaining tight control over permissions and data exposure across the organization.
Ronan McQuillan
Dec 10, 2025
Incident management is one of the most critical practices under the umbrella of ITSM and service management more generally. This concerns how we identify, analyze, and respond to incidents, such as service interruptions, outages, data loss, physical damage, hardware crashes, unauthorized access, and others. The goal is to prevent disruptions, minimize costs and risks, and prevent similar incidents from occurring in the future. Of course, like almost all business processes, incident management has been massively impacted by the rise of artificial intelligence.
Ronan McQuillan
Dec 9, 2025
Budibase has reached a pivotal moment, driven by rapid changes in AI and the needs of privacy-first organizations. To continue supporting these teams, we are evolving. Here is our approach. In my last post , I compared Lowcode to AI Code generators. Now, I’ll focus on Budibase - what we believe, what we’re doubling down on, and where we’re heading. What We Stand For These are the principles that guide how we build Budibase:
Michael Shanks
Dec 8, 2025
Managing user access to various systems, resources, and tools is one of the key responsibilities for IT and security teams. This is critical to ensuring that the right users have access to the resources they need, while at the same time preventing unauthorized users from accessing files and systems. Today, we’re checking out how Budibase can help us to manage user request workflows. Specifically, we’ll be exploring how our open-source, low-code platform makes it easy to build secure, professional system access request forms.
Ronan McQuillan
Dec 4, 2025
When managing incidents, one of the most important and labor-intensive tasks is determining what has actually happened, what impact it could have, and which steps need to be taken to resolve the situation. A key part of this is determining the severity and urgency of the incident, as well as which tools or other CIs and assets it relates to, and, ultimately, which response flow it should be routed to.
Ronan McQuillan
Dec 3, 2025