|
|
|
|
| David Henderson is the Assistant Director of IT at the Department of Attorney General and Justice in the Australian state of New South Wales, where he is responsible for the IC&T infrastructure. David graduated from the University of Wollongong in 1982, with dual majors in chemistry and computing science, including a semester in 1982 at Virginia Commonwealth University in Richmond, VA, through the International Student Exchange Program. Not content with just working in IC&T, David's hobbies are also technical--ham radio, home computing, and radio astronomy. His well-known collection of antique computing equipment (Digital Equipment Corporation PDP-8, PDP-11, and IMSAI 8080, to name but a few) has only recently been moved out of his garage and into a museum--resulting in dramatic benefits for his electricity bills. Prior to moving into the public service, David held a variety of positions in technology service areas, IT, and audit in a career spanning 27 years with resources giant BHP Billiton. Starting as a chemist at the company's Port Kembla steelworks in 1973, his final few years with BHP were as IT manager at the company's copper and gold mine in Papua New Guinea. Since joining the Department of Attorney General and Justice in 2003, David and his colleagues have been managing the data centers, IT systems, and communications for the staff and judiciary at over 180 court houses across New South Wales, a state roughly one-and-a-quarter times the size of Texas. A current project for the department involves expanding network and courtroom video conferencing infrastructure to reduce the cost of delivering justice to the community. David has been a reviewer for Computing Reviews since 2007, and has written 59 reviews. He has been a member of the ACM since 1994, and is also an active senior member of the Australian Computer Society. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 102
reviews
|
|
|
|
|
|
|
|
Trustworthy AI: from principles to practices Li B., Qi P., Liu B., Di S., Liu J., Pei J., Yi J., Zhou B. ACM Computing Surveys 55(9): 1-46, 2023. Type: Article, Reviews: (2 of 2) As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only re...
|
Mar 12 2024 |
|
|
|
|
|
|
The NICE cyber security framework: cyber security intelligence and analytics (2nd ed.) Alsmadi I., Springer International Publishing, Cham, Switzerland, 2023. 396 pp. Type: Book (9783031216503) Demand for skilled workers in the field of cybersecurity is currently strong and expected to remain so for the next few years. At the same time, many countries are experiencing skill shortages in this area. This book describes the National Initiat...
|
Aug 29 2023 |
|
|
|
|
|
|
Prophets of computing: visions of society transformed by computing van Lente D., ACM Books, New York, NY, 2022. 556 pp. Type: Book (1450398154) The dramatic rise of digital computers in the second half of the 20th century did not just happen. This profound change was driven by governments and a number of inspired individuals, with levels of success varying across different countries and c...
|
Jul 4 2023 |
|
|
|
|
|
|
Model-driven DevOps: increasing agility and security in your physical network through DevOps King J., Carter S., Pearson Education, Boston, MA, 2023. 192 pp. Type: Book (0137644671), Reviews: (2 of 2) Network infrastructure management and operations are often very manually intensive processes, prone to error and slow to react to business needs. DevOps is a set of practices and tools in software development, focusing on efficiency to integrate a...
|
Apr 3 2023 |
|
|
|
|
|
|
Big breaches: cybersecurity lessons for everyone Daswani N., Elbayadi M., Apress, New York, NY, 2021. 476 pp. Type: Book (978-1-484266-54-0) This large work begins with an introductory preface that provides historical perspective on cybercriminals and introduces the authors and the basic tenets of the book. The work is divided into two broad parts: the first gives detailed descriptions...
|
Mar 31 2023 |
|
|
|
|
|
|
Security of ubiquitous computing systems Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (1 of 2) “Internet of Things (IoT)” is a popular term used to describe ubiquitous devices: a broad range of small, connected computing devices that are constrained in memory, processing capacity, and electrical power. The interconnected nature ...
|
Feb 10 2022 |
|
|
|
|
|
|
Security of ubiquitous computing systems Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (1 of 2) “Internet of Things (IoT)” is a popular term used to describe ubiquitous devices: a broad range of small, connected computing devices that are constrained in memory, processing capacity, and electrical power. The interconnected nature ...
|
Feb 10 2022 |
|
|
|
|
|
|
Data storage auditing service in cloud computing: challenges, methods and opportunities Yang K., Jia X. World Wide Web 15(4): 409-428, 2020. Type: Article Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also introduces ne...
|
Feb 7 2022 |
|
|
|
|
|
|
Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction Agosti M., Crivellari F., Di Nunzio G. Data Mining and Knowledge Discovery 24(3): 663-696, 2020. Type: Article We are all aware that computer systems log user activity. Exactly what is done, if anything, with these logs is less clear. In this paper, Agosti et al. review log analysis research over the past ten years to trace the state of the art in analyzin...
|
Jan 11 2022 |
|
|
|
|
|
|
Skype & Type: keyboard eavesdropping in voice-over-IP Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article
In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants t...
|
Aug 24 2021 |
|
|
|
|
|
|
|
|
|
|
|