blog header-cdh2.png

Insights Blog

Providing thought leadership around hot topics in technology

C/D/H Consultant

Recent Posts

Is It Time to Renovate or Rebuild?

on Oct 20, 2016 7:45:00 AM By | C/D/H Consultant | 0 Comments | Application Development Software Development
Renovate or rebuild?
Read More

Software Development: Should I Upgrade?

on Oct 15, 2016 10:00:00 PM By | C/D/H Consultant | 0 Comments | Software Development
Should You Upgrade?
Read More

Interpersonal Relationships in Project Management

on Sep 12, 2016 8:18:00 AM By | C/D/H Consultant | 0 Comments | Project Management
Based on managing projects for over 25 years, the most significant lesson I can share is the importance of relationship building. As companies move away from organization charts and staff projects using the Agent Based Modeling Technique (see “Understanding the Complexity of Project Team Member Selection Through Agent-Based Modeling”), it is increasingly important for project managers to put more personal attention to team members’ interpersonal relationships in team selection.
Read More

Data Security in the Cloud

on Mar 10, 2016 3:25:00 PM By | C/D/H Consultant | 0 Comments | Cloud Security Data Loss Prevention
C/D/H - Data Security in the Cloud Data breaches have become a major concern for businesses today, and it’s not hard to see why. It seems like every month there is another horror story about breaches of corporate data.  While many of the largest data breaches involved database attacks, for many companies, loss of confidential documents and emails is the more common threat. For documents, the problem is growing worse due to several trends: Growing user expectations or even business requirements to share sensitive data outside the walls of the organization. The advent of cheap, tiny portable storage (flash drives). The rise of cloud storage and sharing apps like Dropbox, Google Drive, and Microsoft OneDrive. For all these reason, IT leadership has recognized the need to go beyond traditional defenses such as “the three As” (authentication, authorization and auditing) and network perimeter protection (firewalls, proxy servers and intrusion detection). The problem with these approaches is that when they fail, either due to social engineering or zero-day exploits, they become the equivalent of closing the barn door after the horses have escaped.   What is needed is file-level protection that is both portable and content-aware. In other words, documents must be inaccessible even if they are stolen, and the documents that are most sensitive (e.g., personal information and financial data) should be identified and locked down automatically. Microsoft has recently faced this issue head-on in Office 365 with two solution that protect documents in OneDrive, Exchange and SharePoint Online. These offerings are: Azure Rights Management (ARM) Data Loss Prevention (DLP) Data Loss Prevention This is an industry-wide generic term that Microsoft has adopted for its offering. DLP can be thought of as “transmission control:” It analyzes content within documents to determine if it contains sensitive information, and takes actions to prevent sensitive documents from leaving the organization. Preventative measures are implemented automatically if, for example, a document contains Social Security or credit card numbers, and can range from simple warnings to total lockdown of the document. Microsoft’s DLP offering contains a set of built-in content-based rules that implement US and international regulatory requirements, such as HIPAA and Sarbanes-Oxley. Azure Rights Management ARM can be thought of as "usage control". This technology assumes that documents will be shared outside the enterprise, so tries to retain control over documents no matter where they are. It protects documents from unauthorized disclosure regardless of where the document is. It does this by encrypting the documents, and embedding in them a “check-in” to a cloud service that applies rules as to whether the document can be opened by a given user, and if so, what that user can do with it. For example, a document locked down by IRM can be sent to a business partner who is identified by their login to a cloud authentication service such as Microsoft Live or Google’s Gmail.   Once the authorized user opens the document, IRM can prevent any of the following actions: Sending by email Copying Printing Screen captures (some) Access can be expired on a specific date ARM works by encrypting the file with a key that can only be opened by accessing ARM servers in the cloud. The protection covers all Office suite documents, as well as PDFs. And it works across multiple platforms, including iOS, MacOS, Android and Windows. Summing up Office 365 with DLP and ARM provides the right tools for data security in the cloud. There are other companies offering similar products, but Microsoft’s have some unique advantages: Very easy to set up—a few clicks of a mouse. Integrates fully with Office and Windows, but also works on iPads, MacOS and Android. DLP intelligently prevents sharing of documents based on content, and has dozens of built-in rules reflecting regulations for data security and privacy from around the world. ARM allows sharing, but restricts further sharing or editing.   It can be applied to whole sites/libraries, or invoked ad hoc by the end user.
Read More

Nintex March Release: New Provisioning Actions for Workflow Office 365

on Apr 3, 2015 8:31:00 AM By | C/D/H Consultant | 0 Comments | Workflow Microsoft Office Nintex Office 365
Nintex has announced the release of two new actions for Workflow Office 365 Enterprise Edition, Create Site Collection and Delete Site Collection.  Provisioning rights are required to setup the actions and not all users have provisioning rights in Office 365, therefore, admin credentials will be required to configure these actions. Once the actions are configured in a workflow, they are accessible to all users.  Instead of manually creating site collections, the Create Site Collectionaction can be used in a workflow process to automatically create a site collection. The same automated process can be done to delete a site collection using the Delete Site Collectionworkflow action. Keep in mind the delete action is permanent, once the workflow deletes the site collection it is irretrievable and cannot be restored. What a great way to save time and make processes more efficient!
Read More

Discovering SQL Server-Part 4 (How to Search a Database Server for Locks)

on Aug 6, 2014 8:58:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases.  In the previous posting, we discussed: how to search a database for table row counts.  In this post, we are going to review how to search a database server for locking information.
Read More

Discovering SQL Server-Part 3 (How to Search a Database for Table Row Counts)

on Aug 6, 2014 8:48:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases.  In the previous part of this series, we discussed and provided queries for: How to search a database for a given string or GUID.  In this post, we are going to provide another discovery query to search a database for table row counts.
Read More

Discovering SQL Server-Part 2 (How to Search a Database for a Given String or GUID)

on Aug 6, 2014 8:44:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases.  In part two, we discussed: How to search the definition of SQL stored procedures, stored functions and triggers.  In this part, we are going to provide another discovery query to search an entire database for a given string or GUID.
Read More

Discovering SQL Server-Part 1 (How to Search the Definition of SQL Stored Procedures)

on Aug 6, 2014 8:35:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases. In this posting, we are going to provide another discovery query which allows us to query procedure object definitions.
Read More

Watching LINQ: Lambdas and Anonymous Methods in The Debug Window

on Aug 6, 2014 8:27:00 AM By | C/D/H Consultant | 0 Comments | Application Development
In working with LINQ, I have found one of my most frustrating problems with lambda expressions or anonymous methods is that they do not work in a debug window.
Read More