Feeds

Computer expert and broadcaster Ian McNaught-Davis dies at 84

Face of the Beeb's Micro unplugs

  • alert
  • submit to reddit

High performance access to file storage

Obit Ian McNaught-Davis, star of the BBC's The Computer Programme, has died at the age of 84. His funeral is being held in London this afternoon.

MAC, as he was affectionately known to his friends, was an accomplished mountaineer, television broadcaster, mathematician and computer expert, who lit up the screens of tech enthusiasts across Blighty back in the 1980s.

He was the main presenter on more than 60 telly programmes as part of the BBC's Computer Literacy Project, which first aired in 1979.

Three years later, McNaught-Davis co-presented Making the Most of the Micro with Chris Serle. But it was McNaught-Davis - with his deep understanding and ability to make tech discussions accessible to many - who made the mysteries of the computer come alive back in the days of the 8-bit era.

"MAC was 'the man who knew about computers'," said David Allen, who was the editor of the BBC Computer Literacy Project between 1979 and 1987.

McNaught-Davis was considered to be the face of the BBC Micro computer, but Allen noted in a post for the National Museum of Computing that "MAC was a man for whom 'the micro' was slightly beneath him - he treated it as a new boy on the block."

He also appeared as "wizard of the microchip" on the BBC's The Adventure Game. Here he is in action:

Youtube Video

In his later years, McNaught-Davis became a patron of the British Mountaineering Council, having been its president for three years in the early '90s.

His greatest achievement in that high altitude field was to make the first ascent of Muztagh Tower [7,276m, 23,871ft] with three other men in 1956, reminisced fellow climber Doug Scott.

"He was a superb raconteur entertaining audiences and guests at climbing events and dinners where his self-deprecating humour had everyone completely captivated," Scott added.

McNaught-Davis was diagnosed with Alzheimer's disease a few years ago and, more recently, liver cancer. He died on 8 February, aged 84. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.