blog header-cdh2.png

Insights Blog

Providing thought leadership around hot topics in technology

How-To Improve the UX of Your Website

on Oct 4, 2016 3:09:05 PM By | Ben Froese | 0 Comments | UX
Improving Your UX in 5 Easy Steps In this day and age, one of the most important aspects of a company's business is their website. Your website has the opportunity to be apowerful asset. However, if not designed correctly, it can also be your biggest hinderance.  We have put together a list of 5 resources you can utilize to help improve the UX of your website. 
Read More

Don't Reinvent The Wheel

on Oct 4, 2016 3:08:28 PM By | Jerry Dwinell | 0 Comments | Software Development
 The Power of Leveraging Services Have you ever discovered after having written a piece of code; that someone else in the organization already had a routine to do what you just wrote? How many hours have been duplicated writing things that already exist? Now, expand that beyond your organization and you'll begin to see the scale of the wasted hours of reinventing wheels.
Read More

Interpersonal Relationships in Project Management

on Sep 12, 2016 8:18:00 AM By | C/D/H Consultant | 0 Comments | Project Management
Based on managing projects for over 25 years, the most significant lesson I can share is the importance of relationship building. As companies move away from organization charts and staff projects using the Agent Based Modeling Technique (see “Understanding the Complexity of Project Team Member Selection Through Agent-Based Modeling”), it is increasingly important for project managers to put more personal attention to team members’ interpersonal relationships in team selection.
Read More

Do You Need New Software?

on Sep 2, 2016 3:34:00 AM By | Mark Becker | 0 Comments | Insider
It is Not As Simple As You Think: Seems like a simple question, doesn’t it?  It should be pretty straightforward to answer and an easy one to think of.  As a software developer, you would think that I ask people this question all the time, as I (and other developers) are always on the lookout for new projects to start on.  I have to tell you that in that case you would only be partially correct.  I am always on the lookout for interesting software projects to start (either professional or side hobby projects) and get excited when I find one.  However, I have found that my experience has taught me to never ask a business owner if they need new software.
Read More

Moving Your Business Forward with Enterprise Single Page Applications

on Aug 30, 2016 4:56:26 PM By | Aaron North | 0 Comments | Insider
There has been a lot of recent movement in the application development community toward a single page application architecture. The cleaner interfaces and better user experiences of these applications are great, and being adopted by many, but many still wonder if these seemingly simplified applications can meet the needs of their business.
Read More

Ways to Handle Events on Data Change with AngularJS

on Aug 4, 2016 8:21:00 AM By | Ali Aljishi | 0 Comments | Application Development Software Development
On Change Event Handling with AngularJs 
Read More

Data Security in the Cloud

on Mar 10, 2016 3:25:00 PM By | C/D/H Consultant | 0 Comments | Cloud Security Data Loss Prevention
C/D/H - Data Security in the Cloud Data breaches have become a major concern for businesses today, and it’s not hard to see why. It seems like every month there is another horror story about breaches of corporate data.  While many of the largest data breaches involved database attacks, for many companies, loss of confidential documents and emails is the more common threat. For documents, the problem is growing worse due to several trends: Growing user expectations or even business requirements to share sensitive data outside the walls of the organization. The advent of cheap, tiny portable storage (flash drives). The rise of cloud storage and sharing apps like Dropbox, Google Drive, and Microsoft OneDrive. For all these reason, IT leadership has recognized the need to go beyond traditional defenses such as “the three As” (authentication, authorization and auditing) and network perimeter protection (firewalls, proxy servers and intrusion detection). The problem with these approaches is that when they fail, either due to social engineering or zero-day exploits, they become the equivalent of closing the barn door after the horses have escaped.   What is needed is file-level protection that is both portable and content-aware. In other words, documents must be inaccessible even if they are stolen, and the documents that are most sensitive (e.g., personal information and financial data) should be identified and locked down automatically. Microsoft has recently faced this issue head-on in Office 365 with two solution that protect documents in OneDrive, Exchange and SharePoint Online. These offerings are: Azure Rights Management (ARM) Data Loss Prevention (DLP) Data Loss Prevention This is an industry-wide generic term that Microsoft has adopted for its offering. DLP can be thought of as “transmission control:” It analyzes content within documents to determine if it contains sensitive information, and takes actions to prevent sensitive documents from leaving the organization. Preventative measures are implemented automatically if, for example, a document contains Social Security or credit card numbers, and can range from simple warnings to total lockdown of the document. Microsoft’s DLP offering contains a set of built-in content-based rules that implement US and international regulatory requirements, such as HIPAA and Sarbanes-Oxley. Azure Rights Management ARM can be thought of as "usage control". This technology assumes that documents will be shared outside the enterprise, so tries to retain control over documents no matter where they are. It protects documents from unauthorized disclosure regardless of where the document is. It does this by encrypting the documents, and embedding in them a “check-in” to a cloud service that applies rules as to whether the document can be opened by a given user, and if so, what that user can do with it. For example, a document locked down by IRM can be sent to a business partner who is identified by their login to a cloud authentication service such as Microsoft Live or Google’s Gmail.   Once the authorized user opens the document, IRM can prevent any of the following actions: Sending by email Copying Printing Screen captures (some) Access can be expired on a specific date ARM works by encrypting the file with a key that can only be opened by accessing ARM servers in the cloud. The protection covers all Office suite documents, as well as PDFs. And it works across multiple platforms, including iOS, MacOS, Android and Windows. Summing up Office 365 with DLP and ARM provides the right tools for data security in the cloud. There are other companies offering similar products, but Microsoft’s have some unique advantages: Very easy to set up—a few clicks of a mouse. Integrates fully with Office and Windows, but also works on iPads, MacOS and Android. DLP intelligently prevents sharing of documents based on content, and has dozens of built-in rules reflecting regulations for data security and privacy from around the world. ARM allows sharing, but restricts further sharing or editing.   It can be applied to whole sites/libraries, or invoked ad hoc by the end user.
Read More

Nintex March Release: New Provisioning Actions for Workflow Office 365

on Apr 3, 2015 8:31:00 AM By | C/D/H Consultant | 0 Comments | Workflow Microsoft Office Nintex Office 365
Nintex has announced the release of two new actions for Workflow Office 365 Enterprise Edition, Create Site Collection and Delete Site Collection.  Provisioning rights are required to setup the actions and not all users have provisioning rights in Office 365, therefore, admin credentials will be required to configure these actions. Once the actions are configured in a workflow, they are accessible to all users.  Instead of manually creating site collections, the Create Site Collectionaction can be used in a workflow process to automatically create a site collection. The same automated process can be done to delete a site collection using the Delete Site Collectionworkflow action. Keep in mind the delete action is permanent, once the workflow deletes the site collection it is irretrievable and cannot be restored. What a great way to save time and make processes more efficient!
Read More

Discovering SQL Server-Part 4 (How to Search a Database Server for Locks)

on Aug 6, 2014 8:58:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases.  In the previous posting, we discussed: how to search a database for table row counts.  In this post, we are going to review how to search a database server for locking information.
Read More

Discovering SQL Server-Part 3 (How to Search a Database for Table Row Counts)

on Aug 6, 2014 8:48:00 AM By | C/D/H Consultant | 0 Comments | Application Development
As a consultant, I have found it is important to be able to navigate quickly through unfamiliar, large and complicated SQL Server databases.  In the previous part of this series, we discussed and provided queries for: How to search a database for a given string or GUID.  In this post, we are going to provide another discovery query to search a database for table row counts.
Read More