Values

My professional and personal conduct is underpinned by a core philosophy centered on curiosity and interest. These 'archvalues' shape everything I do, from architecting enterprise storage solutions to leading outdoor expeditions. They drive my approach to the world, shaping my decision-making, interactions, and responses to challenges.

These foundational forces are supported by core values that guide my interactions and decisions:

  • Building trust through honesty and integrity
  • Approaching challenges with humility and respect
  • Sharing knowledge with generosity and compassion
  • Maintaining authenticity in all endeavors

Through an ongoing journey of personal and professional growth, these values have evolved. While loyalty once held paramount importance in my youth, experiences have refined my perspective, emphasising the critical role of respect in all relationships. This evolution underscores the dynamic nature of personal and professional ethics, constantly adapting to new insights and experiences.

These values aren't just words on a page - they're demonstrated through my work, whether I'm designing technical solutions for clients, leading groups in the mountains, or building communities around shared interests.

Explore how these values guide my professional and personal life through the articles and pages below. You'll find insights from my own experiences, including reflections on navigating challenging relationships and embracing a life of purpose.

Interest and curiosity are more than personality traits - they are the fundamental forces that drive my approach to life and work. I call these my 'archvalues' because they form the foundation upon which all my other values are built. We can see how these Archvalues work in action, and how they support and nurture my core values.
By nllewellyn, 15 February, 2025
When the FBI released its final case files on Kevin Mitnick, it reignited memories of my early fascination with security, phreaking, and the evolution of telecommunications. Growing up in a household where CB radios, punch-down tools, and telecom equipment were common, I developed a curiosity for how systems worked and where their vulnerabilities lay. But always with a strong ethical foundation. Reading Mitnick’s FBI files today, I see how the social engineering tactics of the past have evolved into modern security threats like phishing and credential harvesting. Now, working in enterprise IT and media storage security, I apply the same systematic thinking that once fueled my interest in telecom exploits—except now, I build resilient systems instead of testing their limits.