A common issue that affects many areas of the IT world is that things often do not go as smoothly as anticipated. Despite the best efforts that...
Robert Agar
Are You Willing to Pay the Price of Non-Compliance?
Data privacy is a hot topic in the world of information technology and promises to remain so for the foreseeable future. As the shift continues to a...
The Problem of Data Breaches Shows No Signs of Slowing Down
An unfortunate and common problem that is encountered just about everywhere in the world is the theft of valuable items from their owners by...
Welcome to the SQL Server Query Store
The current situation we all face with the COVID-19 pandemic has made it difficult or impossible for many individuals to visit their favorite local...
You Need A Reliable Strategy for Protecting Data Resources
Today’s database administrator (DBA) has many responsibilities related to protecting and maintaining access to enterprise data resources....
Who is Responsible and Accountable for a Data Breach?
One of the benefits of forming a corporation is that it provides a level of protection for the individuals who are making decisions regarding the...
Do You Know How Many SQL Servers You Have?
It’s a pretty straightforward question that many database teams may have difficulty answering. For multiple reasons, it may become necessary...
What Are the Risks of Paying for Ransomware?
Ransomware is a particularly nasty type of malware that is being deployed with increased frequency over the past several months. In a ransomware...
Why DBAs Need to Look for Trouble
In some professions, individuals are expected to wait patiently until called upon to perform their functions. There are no opportunities for people...
The Best Way to Use Your Monitoring Software
Many businesses rely on extensive and complex computing environments to run daily operations, service customers, and store valuable data resources....
How to Secure Your SQL Servers from Internal Threats
The tremendous value of enterprise data resources makes them an inviting target for malicious actors. Losing sensitive financial or personal data...
Tips on How to Become a SQL Server Database Administrator
The increased focus that organizations are placing on their data resources has put a premium on their use of database technology. Making productive...
Who Do You Trust with Your SQL Servers?
Protecting enterprise data resources has never been more important. The large quantities of data that many organizations store present an inviting...
Why is MySQL So Popular for Website Development?
Most websites that provide any degree of usefulness or functionality make use of one or several databases. Whether the site is designed to simply...
Boost Productivity with an IDE for Your Database Team
Infographics provide a method of conveying a lot of information in a condensed and visual form. They are a widely-used way of capturing an...
How to Monitor and Streamline SQL Server Jobs
One of the appeals of using SQL Server as a database platform is the functionality and productivity that can be enjoyed through the use of the SQL...
Why You Need to Defragment Your SQL Server Indexes
In the quest for optimal database performance, DBAs need to leave no stone unturned. After keeping the data resources in their systems secure, there...
Maintaining System Visibility in a Cloudburst
For those readers attracted to the title of this post in the hopes of finding a new way to cope with your vehicle’s windshield wipers in a...
Network Security is Your First Line of Defense
Securing an organization’s computing environment from malicious external actors is a critically important and extremely complex undertaking....
New and Persistent Threats to Your SQL Servers
It would be nice if there existed some methodology that enabled DBAs to fully protect their SQL Server environment from hackers, malware, and...
Secure MySQL Databases with These Best Practices
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
Best Practices for Securing MySQL Databases
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
The Right Tools Makes All the Difference
The earliest evidence of the ancient use of tools goes back to about 2.6 million years ago. Basic stone implements were one of the driving forces...
An Efficient Solution for Multi-Platform Environments
One of the challenges that database teams face every day is keeping up with their responsibilities in multi-platform environments. In many shops, a...