Dave McKay
Dave McKay first used computers in the industry when punched paper tape was in vogue and he has been programming ever since. His use of computers pre-dates the birth of the PC and the public release of Unix. He has programmed in everything from 6502 assembly to Lisp, and from Forth to C#.
Don't let his six years at two different Universities fool you. He isn't a theoretical academic sheltered from the stark realities of the modern digital world. He has over 30 years of front-line experience working with IT in demanding business and industrial settings. His first IT technology article was published in Personal Computer World in 1985.
Dave has worked as a freelance programmer, manager of an international software development team, and an IT services project manager. Latterly he was the Data Protection Officer for a managed services provider, responsible for the data protection and regulatory compliance of businesses ranging in size from tens of users up to multiple thousands of users.
He is now a technology journalist and independent Data Protection and Compliance consultant.
Dave is a Linux evangelist, an open-source advocate, and an inveterate tinkerer.
Don't let his six years at two different Universities fool you. He isn't a theoretical academic sheltered from the stark realities of the modern digital world. He has over 30 years of front-line experience working with IT in demanding business and industrial settings. His first IT technology article was published in Personal Computer World in 1985.
Dave has worked as a freelance programmer, manager of an international software development team, and an IT services project manager. Latterly he was the Data Protection Officer for a managed services provider, responsible for the data protection and regulatory compliance of businesses ranging in size from tens of users up to multiple thousands of users.
He is now a technology journalist and independent Data Protection and Compliance consultant.
Dave is a Linux evangelist, an open-source advocate, and an inveterate tinkerer.
Securing Kuburnetes with StackRox
StackRox integrates with Kubernetes to secure clusters of containers by scanning container images during the creation, deployment, and runtime phases. Real-time alerting, dashboards, and standards compliance complete the picture.
The...
ExpressVPN Review: How Does It Perform (and How to Install) on Ubuntu?
ExpressVPN is considered one of the top-tier VPN products. We install it on Ubuntu 21.04 and use it from the command-line and from within a browser. How does it...
What is Whistleblowing, and How to Remain Anonymous
Whistleblowing is a catch-all term for disclosing wrongdoing in an organization. Not everyone will agree it’s for the greater good, so to be safe you need to be anonymous....
Latest posts
Securing Kuburnetes with StackRox
StackRox integrates with Kubernetes to secure clusters of containers by scanning container images during the creation, deployment, and runtime phases. Real-time alerting, dashboards, and...
How to Delete a Folder From File Station on a QNAP NAS
You may occasionally want to do some housekeeping on your QNAP NAS, and deleting folders may be a big part of it. Here's how...
ExpressVPN Review: How Does It Perform (and How to Install) on Ubuntu?
ExpressVPN is considered one of the top-tier VPN products. We install it on Ubuntu 21.04 and use it from the command-line and from within...
Diskashur M2 Secure SSD Review: IP68, FIPS 140-2 Level 3 (soon) and a Good...
iStorage's Diskashur M2 is stylish, stealthy and a pretty decent bargain as far as secure flash drives are concerned. More importantly, it's a good...
Seagate IronWolf 510 Review: A Long-lived NVMe Caching SSD Specifically for NAS
Seagate's IronWolf 510 NVMe SSD is a fast reader with an excellent endurance rating, but it's a very slow, albeit hyper-steady writer. When I...