Hello World
Welcome to the Innitor blog. Insights on software engineering, technical leadership, and building products that actually work.
Kicking off the Innitor blog.
This is where I'll share what I'm learning while building software for clients and advising founders. No fluff, no filler. Just practical insights from the trenches.
What to expect
I'll be covering:
- Engineering deep dives: Architecture decisions, performance optimizations, and lessons learned from production systems
- Cloud infrastructure: Hosting, CI/CD, monitoring. The stuff that keeps systems running
- Startup engineering: How to build fast without creating a maintenance nightmare
- Technical leadership: Helping non-technical founders make better technical decisions
Why bother with a blog?
Honestly? I solve interesting problems and sometimes the solutions are worth sharing. Writing also forces clearer thinking about the work.
Plus, if you're evaluating whether to work with me, reading how I think about problems is probably more useful than a sales pitch.
Stay tuned
More posts coming soon. In the meantime, if you've got a project you'd like to discuss, book a call.
Let's build something.
Get posts like this in your inbox
Practical takes on engineering, compliance, and building products that work. No spam, unsubscribe anytime.

Robbie Cronin
Fractional CTO helping non-technical founders make better technical decisions. Based in Melbourne.
More about RobbieRelated articles
Patch Management for Essential Eight: Timelines, Tools, and What Auditors Actually Check
The Essential Eight patching requirements are aggressive by design. 48 hours for critical vulnerabilities. Two weeks for internet-facing apps. Here's how to actually meet them, which tools work, and where most Australian businesses fail.
essential-eightPhishing-Resistant MFA: What It Means and Why Essential Eight ML2 Demands It
SMS codes and authenticator apps no longer meet Essential Eight Maturity Level 2. Here's what phishing-resistant MFA actually is, which methods qualify, and how to roll it out with FIDO2 security keys, Windows Hello for Business, or passkeys.
essential-eightWDAC for Essential Eight: The Application Control Guide Nobody Wanted to Write
Windows Defender Application Control is the hardest Essential Eight strategy to implement. What WDAC is, how it differs from AppLocker, what each maturity level requires, and how to avoid bricking your fleet.