AS SEEN ON:
Michael O’Dwyer (the owner and managing director of OES Ltd.) is an Irish journalist, blogger and business consultant and is based in Hong Kong/China. He specialises in technology and its relevance to business, society and popular culture.
His former professional roles have involved IT admin, electronic component-level failure analysis, process improvement, quality control and after-sales (a management role). These prior positions allow him to understand the latest in tech and apply this knowledge in articles for a general or highly technical audience.
While his uncredited work dwarfs his credited portfolio, he has been published on Computer Weekly, Forbes.com, The Street, Dell’s Tech Page One, HP’s Pulse of IT and many other online publications.
His preferred topics include anything related to the IT infrastructure (for SMBs or large enterprise) encompassing hardware and software solutions. He is a cybersecurity and privacy advocate and enjoys writing on trends in these areas. Other areas of expertise include data governance and compliance, AI, business operations and industry-focused technology solutions (fintech, martech, legaltech, edtech, greentech, telemedicine etc.).
Skilled in researching obscure topics, Michael’s ability to explain technical topics to a general audience is key to his success. He can even introduce humour to complex topics if desired.
He is happy to consider ghostwriting projects, regardless of desired style or target audience. Not limited to posts or articles, his past projects have included case studies, press releases and white papers. When not writing for clients, Michael updates his websites and contributes to Medium on topics relating to the freelancing life and the technology that powers it.
If you wish to contact him for a future project or wish to suggest a discussion topic for a future post, go ahead. He will respond promptly. To aid your decision, you can review his portfolio below. Writing service types and sample pricing are available.
You can search by keyword or topic if necessary, given that there are more than 200 entries. Note that some older entries are unavailable as companies change or archive their sites. If you find one that’s no longer active, let us know and he’ll send you a screen capture from his internally managed portfolio. You can also view a list of companies that have contributed to these stories and some testimonials from satisfied clients.
A selection of stories published to date.
Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.
In the span of just one minute, the downtime costs from the interruption of mission-critical applications can rise to $10,000. Think then about what an
Moving legacy applications to the cloud can increase performance and enhance daily operations, but what do you need to know about the transition?
But, where do you start? How do you identify potential security threats?
How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.
I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.
What are the risks of Shadow IT? How can they be reduced?
Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.
As IT pros, we’ve been aware for quite some time that some users are a threat to security.
If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.
Two years plus and counting and companies are still being impacted by WannaCry. Here are the four main reasons why an old exploit and ransomware is still an issue.
Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?
Given the number of possible ports, how can network administrators handle a monitoring process or even detect an intrusion?
In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.
How can companies ensure adequate protection of physical and digital files? What are the common attack vectors involved? Does your security policy consider remote and onsite attacks?
Facebook is determined to launch their own digital currency called Libra, but why would anyone trust them at this point?
Azure App Insights will handle public, private and hybrid clouds only. WhatsUp Gold offers an alternative that allows monitoring of the Azure environment and the entire local area network.
It’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data.
Both Azure and AWS offer a variety of cloud offerings. But why is Azure gaining momentum over AWS?
What is the ideal way to ensure reliable yet prompt update installation? In a traditional office environment, is it practical to supervise individual installs? Can we rely on all updates or will they cause additional problems?
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. That isn't always the case.
Should businesses be worried about Huawei or is this really just hysteria and a political agenda that is sending shockwaves around the world?
Over the past few years, Slack has risen to be the largest collaboration tool to help teams stay on track. In this article, I will discuss how it works.
The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.
For years, security pros have emphasised the need for different passwords, as identical passwords make it way too easy for hackers.