Profile of Sean McGrathFreelance IT Writer
News & Commentary Posts: 31
Sean McGrath is a freelance IT writer, researcher, and journalist. He has written for PC Pro, the BBC, and TechWeekEurope, and has produced content for a range of private organizations. Although he holds a first class degree in investigative journalism, his dreams of being a famous political reporter were dashed when he realized that he was mildly better at writing about technology than he was at anything else.
Sean lives on the south coast of England with his wife and dog. In his spare time, he can be found in his shed, where he pulls apart old PCs and attempts to make furniture.
Articles by Sean McGrath
Sue Daley, Head of Big Data, Cloud, and Mobile at techUK, laid out her organisation’s vision for 2020 at Interop London today.
A senior executive at Google UK today called on business leaders to think beyond the capabilities of technology and instead focus on how best to put it to use.
AirWatch’s Dominic Schmidt-Rieche says all the right ingredients are available, but data security is still a concern.
The military and private sector face similar cybersecurity challenges, said military leader at Interop London.
Analytics is the ideal platform to get women to consider tech careers, because it’s multidisciplinary and covers a broad range of subject matter, said Kjersten Moody.
Digital Shadows CTO James Chappell discusses how to use big data and data analytics to stay ahead of attackers.
Caddy shares his thoughts on how CIOs can stay relevant in today’s IT climate.
CEO of Cisco UK & Ireland tells an Interop London audience about the value of the data that comes from connected things.
Hotspot 2.0 has been in development for a few years and is now finally becoming a reality.
How the former IT director at law firm Berwin, Leighton & Paisner got buy-in for a new virtual strategy.
The network will become a sensor itself in the coming world of the Internet of Things, said Cisco’s Phil Smith.
A conversation with James Walker, president of OpenCloud Connect and VP of Managed Network Services at Tata Communications.
Clarke discusses the supermarket's approach to logistics and the Internet of Things.
These five women serve as role models for aspiring female tech minds.
Holman is CEO of penetration testing specialists 2-sec and director of the Information Systems Security Association (ISSA).
Mobile application development platforms offer businesses a level of consistency when adopting different mobile technologies.
Canon executive discusses the role of print security, looking at the big picture, and running with the herd – or not.
The Google exec discusses how businesses can harness the potential of collaboration, transparency, and emerging technology.
It's no longer acceptable for businesses to play the victim when cybercrime strikes. Companies of all sizes must take action.
Interop London speaker Will Fensom, Head of Architecture, Security, and Configuration Management for Essex County Council, talks about his strategy.
The BYOE security model gives cloud customers complete control over the encryption of their data. At the same time, cloud providers are finding innovative ways to let users manage encryption keys.
A discussion of how one of the largest breweries in the world has handled the journey to digital transformation.
Small and medium businesses face big cybercrime challenges on small budgets. Essential practices can help reduce risk.
Find out how to choose the best Mobile Device Management (MDM) product to balance security and privacy needs.
IoT initiatives should start with internal assets and the ability to collect and respond to data.
IT should build flexible backend systems that can adapt to a variety of mobile platforms rather than fixate on specific devices. Here's why.
Crowdtesting lets developers get real-world feedback on applications across multiple platforms with numerous variables.
Star Trek inspired the first mobile phone. Today 4G LTE enables real-world business tools, including feature-rich apps and robust failover.
Business intelligence tools put more power in the hands of end users, but IT must still manage data integrity and security.
The utility computing model, predicted 54 years ago, has been realized by cloud computing -- and continues to evolve.
Just because your company is small doesn't mean it's following the principles--or gaining the benefits--of Agile development.