Loading...
You are here:  Home  >  Articles by David Schlesinger
Latest

The Care and Feeding Of Your Virtual Private Networks

By   /  July 26, 2017  /  BI / Data Science Blogs, Data Architecture Blogs, Data Architecture News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about author David Schlesinger. The Internet is a marvelous system of connected systems. It is a global phenomenon that we are still learning how to use.  Telephone networks could be said to be an ancestor of the Internet, as could the earlier telegraph systems. One factor common to all these electronic communication […]

Read More →
Latest

Why We Can Locate a Size 14 Blue Jacket in Our Warehouse, But Can’t Find Our Sensitive Data

By   /  June 30, 2017  /  BI / Data Science Blogs, BI / Data Science News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Database Blogs, Database News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

A Paradigm is a set way of looking at something.  This makes some things we do more understandable, but often allows us to ignore other ways of doing it. When inventory automation was first introduced on mainframes in the 1960’s, most corporations still ran it only once a month. This was just as they had […]

Read More →
Latest

Let’s Talk Encryption

By   /  May 24, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Database Blogs, Database News, Articles, & Education  /  No Comments

Click to learn more about author David Schlesinger. Wait! I promise – no math! Really! How encryption happens is not your job, and you may be excused from knowing the algorithms, remembering who discovered what, and why there is a secret key. Encryption systems scramble data into gibberish for protection, and then the gibberish can be […]

Read More →
Latest

Ransomware – The New Cyber Protection Racket

By   /  April 19, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. Now that a number of newsworthy institutions such as hospitals, schools, and government offices, have fallen victim to what is called “Ransomware”, the media have finally noticed it. Ransomware, for those not yet familiar, is a pernicious type of cyber-attack where downloaded malware (i.e. “malware” is malicious software […]

Read More →
Latest

Data People Must Build the Bridge to Your Cyber Security People

By   /  March 29, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. Deep down in the basement of your enterprise; in the hidden and dark places amid humming servers and racks of mysterious blinking equipment resides your cyber security staff.  Pony tails, Red Bull cans, and black T-shirts identify some of the most devious and clever people in your company. […]

Read More →
Latest

Cybersecurity Weather Report

By   /  February 6, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. This will be brief, as befits a weather report. However, it will need to be a little bit more specific than the typical TV weathercast. First, beware of growing internet storm clouds approaching. These storms are caused by the heating up of state-sponsored hacking groups. Many nations are […]

Read More →
Latest

Defining Data Policy: The Iron Law of Data Protection

By   /  September 2, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Very seldom do we wake up in the morning with excitement about spending the day defining data policies. Little do we know that this can become a worthwhile activity and can eliminate myriad problems in the future for data administration and protection. While there appear to […]

Read More →
Latest

Data Protection: How Does This Figure Into Your Architecture?

By   /  July 22, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. The credit reports that your company may keep when deciding to allow credit to a new customer just might be considered confidential, especially if your billing department included judgmental remarks and evaluations. The purchase requests from your accounts payable department could potentially show which ingredients you buy […]

Read More →
Latest

Data Governance Security Classifications: Are you “in the know?”

By   /  June 17, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  1 Comment

Click here to learn more about author David Schlesinger. In any enterprise of size, there is a cyber security department. Were you to partner with this team to classify corporate data you would find them able and willing to assist you. They would arrive at the data classification meetings with policies in binders and have […]

Read More →
Latest

4 Enterprise Data Security Protocols to Safeguard Your Personal Data

By   /  April 15, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]

Read More →