Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Henderson, David
NSW Government
PARRAMATTA, Australia
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

David Henderson is the Assistant Director of IT at the Department of Attorney General and Justice in the Australian state of New South Wales, where he is responsible for the IC&T infrastructure. David graduated from the University of Wollongong in 1982, with dual majors in chemistry and computing science, including a semester in 1982 at Virginia Commonwealth University in Richmond, VA, through the International Student Exchange Program.

Not content with just working in IC&T, David's hobbies are also technical--ham radio, home computing, and radio astronomy. His well-known collection of antique computing equipment (Digital Equipment Corporation PDP-8, PDP-11, and IMSAI 8080, to name but a few) has only recently been moved out of his garage and into a museum--resulting in dramatic benefits for his electricity bills.

Prior to moving into the public service, David held a variety of positions in technology service areas, IT, and audit in a career spanning 27 years with resources giant BHP Billiton. Starting as a chemist at the company's Port Kembla steelworks in 1973, his final few years with BHP were as IT manager at the company's copper and gold mine in Papua New Guinea. Since joining the Department of Attorney General and Justice in 2003, David and his colleagues have been managing the data centers, IT systems, and communications for the staff and judiciary at over 180 court houses across New South Wales, a state roughly one-and-a-quarter times the size of Texas. A current project for the department involves expanding network and courtroom video conferencing infrastructure to reduce the cost of delivering justice to the community.

David has been a reviewer for Computing Reviews since 2007, and has written 59 reviews. He has been a member of the ACM since 1994, and is also an active senior member of the Australian Computer Society.

 
 
Options:
Date Reviewed  
 
1
- 10 of 113 reviews

   
   System error: where big tech went wrong and how we can reboot
Reich R., Sahami M., Weinstein J.,  HarperCollins, New York, NY, 2021. 352 pp. Type: Book (978-0-063064-88-1)

Today’s massive technology companies are maximizing profit through optimization, efficiency, and, in the opinion of some, a dystopian obsession with algorithms, surveillance, and control. While some contemporary authors such as Talia [1] sim...

Jun 28 2022  
   A new history of modern computing
Haigh T., Ceruzzi P.,  MIT Press, Cambridge, MA, 2021. 544 pp. Type: Book (978-2-625429-00-8)

When Ceruzzi’s earlier work [1] was first published, in 1998, mobile phones were just phones and not at all “smart,” the Internet was still largely a curiosity, and most of the entrepreneurs and founders of today’s Internet...

Mar 4 2022  
   Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J.,  Springer International Publishing, New York, NY, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (1 of 2)

“Internet of Things (IoT)” is a popular term used to describe ubiquitous devices: a broad range of small, connected computing devices that are constrained in memory, processing capacity, and electrical power. The interconnected nature ...

Feb 10 2022  
   Data storage auditing service in cloud computing: challenges, methods and opportunities
Yang K., Jia X.  World Wide Web 15(4): 409-428, 2020. Type: Article

Cloud computing provides a convenient, scalable, and cost-effective data storage solution that is particularly attractive to small organizations who lack internal information technology (IT) resources. However, this new solution also introduces ne...

Feb 7 2022  
   Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction
Agosti M., Crivellari F., Di Nunzio G.  Data Mining and Knowledge Discovery 24(3): 663-696, 2020. Type: Article

We are all aware that computer systems log user activity. Exactly what, if anything, is done with these logs is less clear. In this paper, Agosti et al. review log analysis research over the past ten years to trace the state of the art in analyzin...

Jan 11 2022  
   Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G.  ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article

In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants to continue t...

Aug 24 2021  
   Computer networks and the Internet: a hands-on approach
Howser G.,  Springer International Publishing, New York, NY, 2020. 539 pp. Type: Book (978-3-030344-95-5)

Most people in the developed world routinely use the Internet, but only a small minority understands the technologies on which its services depend. Howser provides a detailed description of these technologies, supported by practical exercises usin...

Aug 17 2021  
   Lightweight and informative traffic metrics for data center monitoring
Xu K., Wang F., Wang H.  Journal of Network and Systems Management 20(2): 226-243, 2020. Type: Article

Modern cloud computing data centers typically deliver virtualized services to tens of thousands of cloud users continuously, using hundreds or even thousands of commodity servers. Monitoring the availability, performance, and security of this data...

Aug 16 2021  
   iCanCloud: a flexible and scalable cloud infrastructure simulator
Núñez A., Vázquez-Poletti J., Caminero A., Castañé G., Carretero J., Llorente I.  Journal of Grid Computing 10(1): 185-209, 2020. Type: Article

Cloud computing is a flexible and scalable solution for delivering information technology (IT) services. However, as the processing power used must be paid for, accurately right-sizing the cloud resources for particular end user applications is im...

Jul 26 2021  
   Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots
Joseph L., Mukesh R.  Mobile Networks and Applications 24(4): 1240-1248, 2019. Type: Article

Virtual machines (VMs) in the form of cloud computing are now mainstream for the delivery of information technology (IT) services. However, the environment in which these VMs run is complex and prone to malicious attack, potentially impacting serv...

Jun 17 2021  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy