Data can be skewed by its nature. How can you tell if you have skewed data in your database? And if you do, how do you handle it when writing...
database-tools
Maintaining System Visibility in a Cloudburst
For those readers attracted to the title of this post in the hopes of finding a new way to cope with your vehicle’s windshield wipers in a...
Using PowerShell 7 inside PowerShell ISE
The PowerShell ISE built into Windows works with Windows PowerShell only and is stuck at PowerShell version 5.1. Typically, when you want to use an...
Network Security is Your First Line of Defense
Securing an organization’s computing environment from malicious external actors is a critically important and extremely complex undertaking....
New and Persistent Threats to Your SQL Servers
It would be nice if there existed some methodology that enabled DBAs to fully protect their SQL Server environment from hackers, malware, and...
Using $Is* Variables
In PowerShell 7, there is a new set of variables all starting with “Is”. They help you understand the environment in which your script...
Relational Division
Dr. Codd’s original relational algebra had eight basic operations. Since relational database management systems are based on set theory, the...
Secure MySQL Databases with These Best Practices
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
Enabling and Disabling Realtime Antivirus Protection
You can use PowerShell to enable and disable real-time antivirus protection provided you are running with full Administrator privileges. Temporarily...
Best Practices for Securing MySQL Databases
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
The Right Tools Makes All the Difference
The earliest evidence of the ancient use of tools goes back to about 2.6 million years ago. Basic stone implements were one of the driving forces...
Identifying Antivirus Engine State
In the previous tip you learned how you can query WMI to find out the antivirus product present on your Windows machine: $info = Get-CimInstance...
How can you handle the complexities of analytics for big data for healthcare?
Analytics for big data rapidly has become indispensable for nearly all clinical and operational processes in the healthcare industry. Such functions...
Identifying Installed Antivirus Product
A PowerShell one-liner can help you identify the antivirus product installed on a Windows box: PS> Get-CimInstance -Namespace...
What are the real benefits of database automation?
Many of the administrative tasks required to keep databases operating efficiently need to be performed regularly. While in some respects, these...
An Efficient Solution for Multi-Platform Environments
One of the challenges that database teams face every day is keeping up with their responsibilities in multi-platform environments. In many shops, a...
Deleting Microsoft Teams Cache Data
If you use Microsoft Teams for video conferencing, you may occasionally want to clean cache files and remove traces which reside in a number of...
SQL Server Tuning Tips You Need to Know
Tuning their systems for optimal performance is one of the main responsibilities of database administrators. It can often be a difficult task to...
Best Practices for a Successful Data Migration
Data migration is defined as the process of transporting data between computer systems, storage devices, or formats. While it is usually not part of...
Deleting Multiple Subfolders
Occasionally, it may become necessary to delete a set of subfolders within a given folder. Here is a simple chunk of code that deletes the folders...
What do you need to consider when moving databases out of the cloud during cloud repatriation?
The promise inherent in new paradigms can often be the impetus for making major decisions in the business world. Companies want to take advantage of...
Surviving the Damages of a Data Breach
Just about the last thing that any IT organization wants to experience is a data breach. The ramifications of misappropriated data can be severe and...
Managing Autostarts
To manage auto starting programs on Windows, don’t bother writing extensive scripts. PowerShell can directly open the autostart manager...
Is your organization ready for the Internet of Things (IoT)?
The Internet of Things (IoT) is the term used to describe the connection of network-capable devices to the Internet and other connected devices. The...