Michael O'Dwyer

Content Strategist, Copy Editor, Copywriter, Editor, Ghostwriter, Technical Writer, Writer

Business & technology journalist seeking remote freelance projects

Michael's specialties lie in writing for enterprise, small business and IT audiences, as it complements his prior professional experience of more than 20 years.
Former professional roles have included IT admin, electronic component-level failure analysis (Senior Debug Technician), process improvement (Process Engineer), quality engineer and after-sales manager.

In addition to uncredited work both online and in print (for Time Inc. among others), he has been published on Computer Weekly, Forbes.com, The Street, Dell's Tech Page One, HP's Pulse of IT and more.

He writes mainly for the US market at present, although, as an Irish native, UK English is possible. He welcomes remote projects or remote contract work only and is always seeking expert sources or thought leaders to contribute to future stories.

Those interested in promotional opportunities in future projects can join his mailing list on www.youronlinecontent.com or connect with him on LinkedIn, by using the contact info provided.

Samples of uncredited work (published on TechCrunch, Datanami and many other locations) available on request.
Categories
Content Types
Article, Blog Post, Whitepaper, Ebook, Social Copy, Website Copy, Interview, Press Release, Ad/Promotional Copy, Email Newsletter, Guide, Commercial
More Information
Hong Kong|English
Publications
N/A

Published Content

39
whatsupgold.com
Article
Managing User Permissions in Active Directory is the Logical Choice

Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are necessary. In smaller organizations, setting user permissions in Windows for network objects is achieved using Windows Explorer, simply right click on a file, folder, volume or device and permissions can be changed if the user has admin control. In this rudimentary example, the ability to read, write and modify file or folder permissions is assigned and a valid user can easily be added with the correct permissions. No big deal, right?

October, 15 2018
whatsupgold.com
Article
How to Easily Monitor Bandwidth Usage Per Device

For home users, monitoring bandwidth usage per device may seem like a pointless exercise but their business counterparts typically recognize the value of doing so. Bandwidth is not a limitless resource and total broadband bandwidth (as provided by your internet service provider or ISP) is shared between all the devices connected to the network. If one is taking more than its fair share, then the bandwidth available to the rest is reduced.

November, 6 2018
whatsupgold.com
Article
Are Disruptive Technologies Making Bandwidth Monitoring More Important?

There is no one-size-fits-all elixir that will satisfy your future bandwidth requirements. Just like ISPs, broadcasters, and telecom service providers, your organization will need to plan for a future with ever-increasing data traffic OR at least take the necessary steps to monitor and set traffic allowances according to business goals.

January, 28 2019
blog.ipswitch.com
Blog Post
8 Reasons To Automate Your File Transfers

Whether you call it personally identifiable information (PII), protected health information (PHI), or employee data, it’s all sensitive, and in the wrong hands, data can be used against the compromised target in the form of identity theft or financial fraud.

February, 11 2019
blog.ipswitch.com
Article
Does the US Need a Constitutional Amendment for Data Privacy?

Data privacy seems to have surpassed all other technological buzzwords (with Big Data, AI and IoT largely responsible for the increase in available data) in the last few years, primarily because of the number of data breaches, which continues to rise unabated each year.

January, 22 2019
blog.ipswitch.com
Article
Is Running A Virtual Machine (VM) Worth The Effort?

In the computing world, virtualization by way of virtual machines is used to describe a method of avoiding the purchase of multiple physical computers or servers, one for each operating system. A virtual machine is not a machine in the true sense of the word in that it has nothing to do with mechanical power, and has nothing to do with virtual reality (VR).

November, 20 2018
smseagle.eu
Article
Bring Your Own Device (BYOD) — Security And Other Considerations For Stakeholders

Today’s employees are always connected, thanks to ubiquitous broadband and a wide range of portable devices, from smartphones, tablets and laptops to fitness trackers and a plethora of smart devices such as watches, cameras and GPS navigators. How necessary is this level of connection?

December, 10 2018
blog.ipswitch.com
Article
Is The EU Copyright Directive A Bad Idea?

The link tax, death of the meme and more

November, 12 2018
blog.ipswitch.com
Article
What UK Businesses Must Know About GDPR and Brexit
September, 24 2018
blog.ipswitch.com
Internet of Things 101 – IoT Device Authentication Explained

how IoT devices communicate

September, 26 2018
blog.ipswitch.com
Article
Benefits of Managed File Transfer for Banking and Finance

overview of advantages such as audit trail and scalability

October, 25 2018
blog.ipswitch.com
Article
How to Choose the Right Managed File Transfer Solution

Why managed file transfer has many advantages over FTP

August, 27 2018
smseagle.eu
Article
Network Security – Why Security Awareness is Essential for Internal Threat Management?
August, 6 2018
blog.ipswitch.com
Article
The Evolution of Integration and the Rise of Middleware

includes expert quotes and humour

April, 16 2018
blog.ipswitch.com
Article
Is Java Actually Dying?

includes expert quotes

April, 3 2018
blog.ipswitch.com
Article
IoT Security: What is It, and Why Does It Matter?

IoT vs Security, with expert quotes

March, 20 2018
smseagle.eu
Article
What Every Disaster Recovery Plan Must Include

The key elements of a DR plan

March, 19 2018
blog.ipswitch.com
Article
Smart Speakers 101: Google vs. Amazon and The Rest

includes expert quotes

February, 28 2018
blog.ipswitch.com
Article
How User Agreements Are Killing our Privacy

An argument against data monetisation

February, 13 2018
blog.ipswitch.com
Article
How Likely Are You to Lose Your Job to a Robot?

includes original expert quotes

February, 12 2018
blog.ipswitch.com
Article
The Rise of the $1000 Smartphone: Will Businesses Embrace Expensive Phones?

Commentary piece with expert quotes and humour

February, 2 2018
blog.ipswitch.com
Article
Digital Threats to Democracy—Real and Imagined

Commentary piece with expert quotes and humour

February, 6 2018
blog.ipswitch.com
Article
How to Use Automation to Make Your Website Work for You

Includes expert quotes and irreverent humour

January, 23 2018
smseagle.eu
Article
Is your Disaster Recovery Plan Designed to Reduce Downtime?
December, 18 2017
smseagle.eu
Article
Stats and Surveys Confirm Rising Downtime Costs for Data Centres, SMBs and Enterprises

Article emphasises the benefits of redundancy

November, 13 2017
smseagle.eu
Article
Why Digital Marketers Embrace SMS Campaigns

SMS is still an effective marketing tool?

September, 4 2017
smseagle.eu
Article
Network Monitoring — How SMS can Reduce Risk and Improve Response Time
July, 21 2017
blog.ipswitch.com
Article
How IT Pros Really Feel About Successful Phishing Attacks

Opinion piece with elements of humour

January, 22 2018
computerweekly.com
Article
Why immutable buckets are a worthy risk management tool

Interview-based pieces on the benefits of remote cloud storage with immutability

June, 30 2017
PDF upload
Article
HP Enterprise-Why-you-should-warm-up-to-hyper-convergence
February, 12 2017
yourworld.anz.com
Article
Disruptive DNA: Chris J. Reed - Black Marketing

An interview-based story

April, 23 2017
smseagle.eu
Article
Redundancy and Automated Alerts Ensure Business Continuity?

SMS as an alert system?

October, 4 2016
smseagle.eu
Article
How SMS Remains Relevant in Spite of Emerging Tech

Shows how old technology is still relevant today

August, 5 2016
PDF upload
Article
HP's Pulse of IT-Tackling fringe devices and securing the edge of your network

Includes original expert quotes

August, 9 2016
PDF upload
Guide
WD Ventito-How To Turn Your Hard Drive Into a Charging Station

A brief 'howto' on repurposing an old PC

February, 4 2015
thestreet.com
Article
Why Hackers Will Continue to Target Financial Services in 2015

A brief opinion piece

December, 4 2014
PDF upload
Article
Dell's Tech Page One-Mobile apps for business increase productivity

Story on how mobile apps can aid productivity with original expert quotes

August, 14 2014
PDF upload
Blog Post
IBM's Midsize Insider-ERP Project Management a Problem for US Air Force

General reported news post

November, 19 2012
forbes.com
Article
The Next-Generation Tech Helping The Police Fight Crime

A story on improving crime-fighting tech with original quotes from law enforcement and technical experts

July, 21 2014
© ClearVoice, Inc.