nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Michael O'Dwyer

Michael O'Dwyer

Headline

Technology & business journalist, writer and blogger

About Me

Michael's specialties lie in writing for enterprise, small business and IT audiences, as it complements his prior professional experience of more than 20 years.
 Former professional roles have included IT admin, electronic component-level failure analysis (Senior Debug Technician), process improvement (Process Engineer), quality engineer and after-sales manager.


 In addition to uncredited work both online and in print (for Time Inc. among others), he has been published on Computer Weekly, Forbes.com, The Street, Dell's Tech Page One, HP's Pulse of IT and more.


 He writes mainly for the US market at present, although, as an Irish native, UK English is possible. He welcomes remote projects or remote contract work only and is always seeking expert sources or thought leaders to contribute to future stories.


 Those interested in promotional opportunities in future projects can join his mailing list on www.youronlinecontent.com or connect with him on LinkedIn, by using the contact info provided.


Samples of uncredited work (published on TechCrunch, Datanami and many other locations) available on request.


Industries I Write About

Computer & Network Security

Find writers and ideas in this industry

Internet

Find writers and ideas in this industry

Computer Hardware

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Computer Software

Find writers and ideas in this industry

Consumer Electronics

Find writers and ideas in this industry

Marketing & Advertising

Find writers and ideas in this industry

Writing & Editing

Find writers and ideas in this industry

Electrical & Electronic Manufacturing

Find writers and ideas in this industry

My Writing Samples

The Next-Generation Tech Helping The Police Fight Crime

While RoboCop-type solutions to law enforcement are not yet on the horizon, the Internet of Things (IoT) has a promising future in the ongoing fight against crime. Police departments across the globe are adopting new technology, including the NYPD’s testing of Google Glass and the LAPD’s trial of on-body cameras.

https://www.forbes.com/sites/ptc/2014/07/21/the-next-generation-tech-helping-the-police-fight-crime/#7144676d5376

Mobile apps for business increase productivity

“Candy Crush,”“Angry Birds” and “Plants vs. Zombies” are among the most successful consumer apps on the market, enjoying a presence on multiple mobile and desktop platforms. Marketers have realized that mobile app development has great advertising potential and tried to emulate these success stories in their mobile business applications.

https://web.archive.org/web/20141017063535/http://techpageone.dell.com:80/business/management-business/mobile-apps-for-business-increase-productivity

How To Turn Your Hard Drive Into a Charging Station

Why not dedicate an old desktop PC as a ‘charging station’ that will handle all of your charging requirements and free up precious USB ports on your habitually used machine? Here’s how you do it:

https://web.archive.org/web/20150503102316/http://wdc.com:80/ventito/tech/howto/how-to-turn-your-hard-drive-into-a-charging-station

Why Hackers Will Continue to Target Financial Services in 2015

In 2015, cyber criminals will diversify and financial incentives will be the driving force behind advanced persistent threats (APTs) according to the Kaspersky Security Bulletin 2014. Predictions 2015 report published by Kaspersky Lab, a software security vendor headquartered in Moscow.

https://www.thestreet.com/story/12974352/1/why-hackers-will-continue-to-target-financial-services-in-2015.html

Tackling fringe devices and securing the edge of your network

A fringe device isn't a device on the physical peripheral of a company network; instead, the term refers to a device not regularly used, not strictly monitored, or haphazardly introduced without approval from IT. A few common examples include:

https://web.archive.org/web/20161027214418/http://thepulseofit.com:80/en-us/article/tackling-fringe-devices-and-securing-the-edge-of-your-network

How SMS Remains Relevant in Spite of Emerging Tech

In 1992, the first Short Message Service (SMS) simply read “Merry Christmas”. More than 20 years later, texting via SMS has lost none of its purpose, despite the rise of multimedia messaging service (MMS), the smartphone in 2010, subsequent over the top (OTT) messaging apps and of course, social media solutions such as Facebook. Whether for personal or business use, SMS usage has continued unabated, which is impressive for such ‘outdated technology’.

https://www.smseagle.eu/2016/08/05/how-sms-remains-relevant-in-spite-of-emerging-tech/

Redundancy and Automated Alerts Ensure Business Continuity?

In the UK and Ireland, you are made redundant when you lose your job. When something is redundant, it means that it is unnecessary, a duplicate of the existing. However, in networking and indeed business terms, having redundant options is a positive concept, as it refers to backup solutions that take over when the primary fails.

https://www.smseagle.eu/2016/10/04/redundancy-and-automated-alerts-ensure-business-continuity/

Disruptive DNA: Chris J. Reed - Black Marketing

It's taken Chris Reed less than two years to grow his company Black Marketing from a one-man operation in Singapore to a NASDAQ-traded company with more than 40 employees in dozens of countries. His success is due to an unusual business model: it relies on the LinkedIn social media platform, where his profile is one of the most viewed on LinkedIn worldwide, earning him a coveted 'Power Profile' status.

https://www.yourworld.anz.com/personal-growth/chris-j-reed-black-marketing

Why you should warm up to hyper-convergence

Not all trends are created equal. Small and midsize businesses shouldn't go around adopting new technology trends and rolling out new services left and right—they simply don't have the means to do so. Instead, they should focus on the trends that really matter and offer the potential to revolutionize their business processes. Hyper-convergence is one such trend.

https://www.hpe.com/h30683/us/en/hpe-smb/Why-you-should-warm-up-to-hyper-convergence_1643923.html

How IT Pros Really Feel About Successful Phishing Attacks

In a modern business, IT is responsible for a plethora of tasks, including user support, which typically takes up a disproportional percentage of the IT workload. Yet, we are supposed to assure users that repeat errors are the result of sophisticated attacks by professional hackers. Sure, some are, but the majority are easily spotted and no doubt released by bedwetters that buy the tools necessary on the Dark Web, using their preferred currency Bitcoin. Oh, how they love Bitcoin.

https://blog.ipswitch.com/how-it-pros-really-feel-about-phishing-attacks

Why immutable buckets are a worthy risk management tool

Data loss, even if temporary (prior to restoration after a ransomware attack, for example) disrupts business activity and causes reputational damage, driving companies to find better ways to protect their data better to minimise the risks associated with a cyber-attack, hardware failure or any other external or internal threat such as malicious employees.

https://www.computerweekly.com/feature/Why-immutable-buckets-are-a-worthy-risk-management-tool

Network Monitoring — How SMS can Reduce Risk and Improve Response Time

As a network administrator, your role is a complex one but your primary task is to keep the network active and ensure that all users have smooth access to all network assets. You may have to conduct performance tests, hardware and software inventory audits (including virtual machines) and monitor areas from UPS battery status to current website connections. Configuration and maintenance take up more of your time. A variety of monitoring tasks are necessary and you perform all of them using a com

https://www.smseagle.eu/2017/07/21/network-monitoring-how-sms-can-reduce-risk-and-improve-response-time/

Why Digital Marketers Embrace SMS Campaigns

Digital marketers are constantly looking for new ways to present their products and services to existing and potential customers. While this attitude to adopt the latest and greatest innovations, whether it is big data, machine learning or virtual reality, is to be applauded, the reality is that older yet effective methods or technologies are often neglected. One example of this is SMS (Short Messaging Service).

https://www.smseagle.eu/2017/09/04/why-digital-marketers-embrace-sms-campaigns/

Stats and Surveys Confirm Rising Downtime Costs for Data Centres, SMBs and Enterprises

Whatever the size of your business or its activities, network downtime has an impact. An obvious observation, it’s true, but have you ever tried to quantify it in terms of actual monetary damage? Have you considered the fickle nature of customers? Reputational damage? Does your disaster recovery plan include the time taken for hardware replacement in the event of a catastrophic failure?

https://www.smseagle.eu/2017/11/13/stats-and-surveys-confirm-rising-downtime-costs-for-data-centres-smbs-and-enterprises/

Is your Disaster Recovery Plan Designed to Reduce Downtime?

Numerous reports, surveys and statistics confirm that commercial entities of all sizes are woefully unprepared for unexpected events. Ivenio IT stated that 54% of companies with less than 500 employees have a disaster recovery (DR) plan in place while 74% of larger companies had one. For smaller companies in the U.S., the figures are even worse with a Nationwide 2015 press release indicating that just 25% of companies with 50 or less employees had an active DR plan. Given the cost of downtime, s

https://www.smseagle.eu/2017/12/18/is-your-disaster-recovery-plan-designed-to-reduce-downtime/

How to Use Automation to Make Your Website Work for You

The global internet population now exceeds 3.7 billion users and when you consider that all are consumers and creators of data (even texting or tweeting counts,) the amount of data involved in a single minute is obviously high. As the Domo infographic demonstrates, 456,000 tweets are sent in a minute on social media. More than 3.5 million Google searches take place in the same timeframe. Is your website showing up in relevant search queries?

https://blog.ipswitch.com/using-automation-to-make-website-work-for-you

Digital Threats to Democracy—Real and Imagined

Democracy is in many ways about protecting freedoms, the freedom of the press, the freedom to bear arms, to arm bears, to vote in elections, and much more. With the advancement of technology, many feel these freedoms are under threat and the alleged Russian interference in the last U.S. presidential election has brought the subject under intense scrutiny.

https://blog.ipswitch.com/digital-threats-to-democracy-real-and-imagined

The Rise of the $1000 Smartphone: Will Businesses Embrace Expensive Phones?

The prospect of spending more than $1,000 in cold hard cash on a smartphone seems ridiculous to many of us, but after the much-publicized release of the iPhone X, the prospect became a very real one. After all, Apple customers are among the most discerning in the world, blindly buying the next iPhone ‘upgrade,’ selling their prior model on the second-hand market to raise some of the funds necessary. A vital organ or two sometimes makes up the shortfall. Anyone else see a problem with this?

https://blog.ipswitch.com/the-rise-of-the-1000-smartphone

How Likely Are You to Lose Your Job to a Robot?

If some comedians speculate that women only tolerate men only because replacement devices can’t buy them dinner, perhaps employers of the future will be as logical when allocating robotic resources to their workforce? Let’s face it: if companies can save money, they will. And if an employee can be reduced to a robotic finger to push a button when needed, they will be. After all, that ‘finger’ doesn’t require a social security number, pension or dental—at least not until such time that robot law

https://blog.ipswitch.com/-how-likely-are-you-to-lose-your-job-to-a-robot

How User Agreements Are Killing our Privacy

Online privacy is a mythical creature not unlike the unicorn or Cyclops—we’ve all heard the tall tales, but we’ve never seen it in the wild. And we have only ourselves to blame. If we take governmental monitoring as a given and add the fact that U.S. ISPs can now monetize their customer’s service usage without permission, is there any expectation of online privacy left? Can we take back control of our browsing data? How do we know what data is being collected by the websites we visit? What acti

https://blog.ipswitch.com/why-user-agreements-are-killing-our-privacy-

Smart Speakers 101: Google vs. Amazon and The Rest

AI (artificial intelligence) is all the rage these days. Hardly surprising, when you consider that natural intelligence seems to get even rarer as the years march swiftly onwards. People are busier than ever before in human history, with their seventeen job roles, five smartphones, and shrinking personalities. “I’m so busy,” they cry out plaintively, seeking someone to talk to as their human friends have long since vanished—they too are ‘too busy.’ True story.

https://blog.ipswitch.com/smart-speakers-101-google-vs.-amazon-and-the-rest

What Every Disaster Recovery Plan Must Include

Business continuity (BC) and disaster recovery (DR) are not the same thing, although there are some common characteristics. A BC plan is designed to include all departments in a company, but a DR plan is often focused on restoring the IT infrastructure and related data. “A disaster recovery plan is an essential IT function and if not in place could result in company bankruptcy or severe reputational damage when data cannot be restored”,

https://www.smseagle.eu/2018/03/19/what-every-disaster-recovery-plan-must-include/

IoT Security: What is It, and Why Does It Matter?

You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This obviously isn’t ideal.

https://blog.ipswitch.com/iot-security-what-is-it-and-why-does-it-matter

Is Java Actually Dying?

There has been a lot of hate towards Java over the years, but there are just as many proponents for the programming language. Here is why Java isn't going anywhere. In February 2018, Gartner Vice President and Distinguished Analyst Anne Thomas clarified in the research note that costs $1295. However, the summary she co-authored states, “The application platform market is morphing in response to digital business requirements. As Java EE and other three-tier frameworks, such as ASP.NET, fade in re

https://blog.ipswitch.com/is-java-actually-dying

The Evolution of Integration and the Rise of Middleware

Back in the early Jurassic era, when Windows NT Server was the OS of choice, an earlier enterprise employer of mine was considering a company-wide change to Windows XP. Unfortunately, this wasn’t possible, and we remained on Windows 2000. Why? Because the entire production process from raw materials to shipment was connected to both SAP and Filemaker Pro.

https://blog.ipswitch.com/evolution-of-integration-rise-of-middleware

Network Security – Why Security Awareness is Essential for Internal Threat Management?

Security awareness is often linked to anti-terrorism programs around the world but in the IT world we are referring to cybersecurity awareness. Many of you are already switching off, yawning and considering leaving this page but hang on a moment…

https://www.smseagle.eu/2018/08/06/network-security-why-security-awareness-is-essential-for-internal-threat-management/

How to Choose the Right Managed File Transfer Solution

For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which solution is best for your company? Companies, regardless of size (from sole proprietorship to large enterprise) or industry, must ensure data security. This is often complicated by the fact that some of their core business processes require data

https://blog.ipswitch.com/how-to-choose-the-right-managed-file-transfer-architecture

Benefits of Managed File Transfer for Banking and Finance

In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements. Managed file transfer (MFT) software is the sole solution that allows an audit trail at all points of the data transfer process, whether that data is at rest or in transit. Of course, there are other benefits to managed file transfer for BFSI companies.

https://blog.ipswitch.com/benefits-of-managed-file-transfer-for-banking-and-finance

Internet of Things 101 – IoT Device Authentication Explained

Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that need management. Just like the software industry, where security by design is encouraged in software development, the IoT needs to incorporate some sort of checking mechanism to ensure that any data created is sent and received

https://blog.ipswitch.com/internet-of-things-101-iot-device-authentication-explained

What UK Businesses Must Know About GDPR and Brexit

Regardless of industry, companies are subject to data protection laws according to their jurisdiction. U.S companies must remain compliant with U.S. data protection regulations and so on. Companies in the healthcare industry or those who process credit card transactions are subject to specific regulations such as HIPAA and PCI-DSS.

https://blog.ipswitch.com/what-uk-businesses-must-know-about-gdpr-and-brexit

Is The EU Copyright Directive A Bad Idea?

The EU Copyright Directive has been labeled a bad deal for all parties and threatens the Internet as we know it. If it's approved, how are businesses going to respond? We’re all familiar with basic copyright terms such as the Berne Convention, duration of copyright (typically for the life of the creator plus 25 or 50 years depending on jurisdiction) and the fact that a creator’s work is automatically copyrighted on creation. We’re also aware that it is supposed to cover the use of works on the

https://blog.ipswitch.com/is-the-eu-copyright-directive-a-bad-idea

Bring Your Own Device (BYOD) — Security And Other Considerations For Stakeholders

Today’s employees are always connected, thanks to ubiquitous broadband and a wide range of portable devices, from smartphones, tablets and laptops to fitness trackers and a plethora of smart devices such as watches, cameras and GPS navigators. How necessary is this level of connection?

https://www.smseagle.eu/2018/12/10/bring-your-own-device-byod-security-and-other-considerations-for-stakeholders/

Is Running A Virtual Machine (VM) Worth The Effort?

In the computing world, virtualization by way of virtual machines is used to describe a method of avoiding the purchase of multiple physical computers or servers, one for each operating system. A virtual machine is not a machine in the true sense of the word in that it has nothing to do with mechanical power, and has nothing to do with virtual reality (VR).

https://blog.ipswitch.com/is-running-a-virtual-machine-vm-worth-the-effort

Does the US Need a Constitutional Amendment for Data Privacy?

Data privacy seems to have surpassed all other technological buzzwords (with Big Data, AI and IoT largely responsible for the increase in available data) in the last few years, primarily because of the number of data breaches, which continues to rise unabated each year.

https://blog.ipswitch.com/does-the-us-need-a-constitutional-amendment-for-data-privacy

8 Reasons To Automate Your File Transfers

We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked. These hacks are increasingly sophisticated, but many could have been prevented by eliminating human error, encrypting data or effective security awareness training. It makes sense to eliminate potential weak points and the file transfer process, in many cases at least, is one of them.

https://blog.ipswitch.com/8-reasons-to-automate-your-file-transfers

Are Disruptive Technologies Making Bandwidth Monitoring More Important?

There is no one-size-fits-all elixir that will satisfy your future bandwidth requirements. Just like ISPs, broadcasters, and telecom service providers, your organization will need to plan for a future with ever-increasing data traffic OR at least take the necessary steps to monitor and set traffic allowances according to business goals. You, as a company stakeholder with a vested interest in the survival of the company, need to consider the data traffic necessary to ensure that company operatio

https://www.whatsupgold.com/blog/network-monitoring/are-disruptive-technologies-making-bandwidth-monitoring-more-important/

How to Easily Monitor Bandwidth Usage Per Device

For home users, monitoring bandwidth usage per device may seem like a pointless exercise but their business counterparts typically recognize the value of doing so. Bandwidth is not a limitless resource and total broadband bandwidth (as provided by your internet service provider or ISP) is shared between all the devices connected to the network. If one is taking more than its fair share, then the bandwidth available to the rest is reduced.

https://www.whatsupgold.com/blog/network-monitoring/how-to-easily-monitor-bandwidth-usage-per-device/

Managing User Permissions in Active Directory is the Logical Choice

Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are necessary. In smaller organizations, setting user permissions in Windows for network objects is achieved using Windows Explorer, simply right click on a fi

https://www.whatsupgold.com/blog/system-administration/managing-user-permissions-in-active-directory-is-the-logical-choice/

Experience

Managing Director/Owner

Outsourced Engineering Solutions Limited is an Irish-owned services-only company, which was incorporated to assist foreign companies with their activities in China. Since 2009, its focus has changed from project and process support to writing and documentation services for corporate online and offline use. Additional information available on the website.

Company: Outsourced Engineering Solutions Limited

I worked there from 1/2009 until now

Ghostwriting

Sale of full-rights stories to several freelance markets. Ghostwriting for corporate/technical blogs and websites. Opinion articles for Australian healthcare magazine (print and online versions) Some creative writing for mobile app provider

Company: Undisclosed - NDA

I worked there from 1/2012 until now

Freelance Contributor

The Pulse of IT is owned by HP and designed to provide insights for forward-thinking SMB owners.Chicago-style stories required.

Company: The Pulse of IT - Powered by HP

I worked there from 8/2015 until 2/2017

Freelance Journalist

Aimed at a business, entrepreneurial audience

Company: ANZ.com

I worked there from 11/2015 until 2/2017

Freelance Journalist - Network Monitor and Managed File Transfer Blogs

Aimed at a highly technical audience of IT decision makers, three blogs are involved. Stories produced sometimes require expert contributors and insights that try to instill a sense of humor into complex topics. My author pages are shown below.

Company: Ipswitch, Inc.

I worked there from 11/2015 until now

Ghostwriter/Freelance Journalist

Time Inc.- Content Marketing and Strategies Division. My contracted role involves the provision of ghostwritten content on business/IT subjects for publications that include some of the most prominent in the Time Inc. stable, such as Fortune, Money and Time. Sponsored content appears on client websites as provided by the appropriate Time Inc. publication. See link below for examples from the content archive.

Company: Time Inc.

I worked there from 4/2016 until 4/2018

Content I Write

Ideas and Pitches I Wrote

Social Engineering: Why Employees need Security Awareness Training

I believe that many hacks can be prevented by ensuring that employees are aware of common cyber attack vectors. I propose a story on these vectors that will educate a general audience. For high-level audiences I can focus on any related angle, whether risk management, data security or other. I'm open to direct assignments on any IT or business-related topic and have no issue with the tech, having spent many years debugging a variety of products to component level. Any writing style possible.

Content type: Blog Post

Keywords: security,hacking,breaches,social engineering

Links:

How employees increase the risk of e-discovery litigation

While the aim is not fearmongering, I'd like to highlight the dangers for companies of all sizes. These include BYOD, shadow IT, employee turnover and internal or external malicious actors. Then I'll provide solutions for each (data management including remote erasure of lost/stolen devices, archiving and more) and end with a CTA of your choosing. The post will also include examples of the potential costs of e-discovery and not just financial, including relevant links to industry surveys.

Content type: Blog Post

Keywords: e-discovery litigation,risk management,data protection,data management

Links:

New Technologies Forcing Evolving Forecasts on Bandwidth Capacity Planning

This post will demonstrate that 40G is no longer sufficient for data center requirements, referencing consumer-driven innovations such as 4K Video, 5G and the IoT. In addition, data analytics and tech such as AI and VR are all soaking up bandwidth. When consumers commonly use high-bandwidth services, service providers face a new challenge. The post will question if they are prepared or not.

Content type: Blog Post

Keywords: bandwidth capacity planning,latency,Shannon effect,optics

Links:

Outsourcing Content Creation 101

I propose a general post outline the options available (individual freelance, content mills, and companies like nDash). As a writer, I have opinions, of course and for intermittent content, an individual could work.The mills section could deteriorate into a rant but I'll content myself with outlining the pros and cons here. Finally, for nDash section,I'll identify the pros and cons (large pool of writers, no bottom feeders, suitable for volume projects, payment management etc.)

Content type: Blog Post

Keywords: content writing,freelancing

Links:

General Intro for Q1 goals

Hi Matt, I'm willing to help with ideas/direction to attract brands in Q1 - perhaps we could focus by industry - emphasizing the importance of writer expertise, or tips for writer selections, or demonstrate platform expertise in any number of areas. If you have some direction on your primary focus then I could offer some targeted pitches. Healthcare would be one obvious industry, for example. Other platforms have related blogs that we could emulate. I'm assuming 800-1000-word posts. Price neg.

Content type: Blog Post

Links:

When Martech Is Too Accurate And The Resulting Impact On Demand Generation

The story could focus on any of the following: 1. When Martech goes too far and it's accuracy or intrusion level scares away customers 2. Ethical analysis of gathered data 3. Personally identifiable information and the need to anonymize and protect data I think it may be worth talking to some experts to gain their insights, which will affect the headline. Also open to additional suggestions on the angle.

Content type: Article

Keywords: martech,AI,geolocation,data analysis,PII,privacy,demand generation

Links:

Why IT Security is Key to Telehealth Adoption

Mr. Liu, How about a post on the conditions necessary to ensure connected devices are secure and follow best practices in terms of permission management, data storage etc. I would also include the technical requirements of such adoption (reliable broadband, redundancy etc.) with examples of telemedicine innovations. OR any primary focus you have in mind.

Content type: Blog Post

Keywords: cyber security,IT Security,MSP,telehealth,telemedicine

Links: