SQL Server database administration is difficult; queries and indexes require tuning in response to application changes. For many database...
database-tools
Announcing the General Availability of SQL Compliance Manager 5.8
We are excited to announce the release of SQL Compliance Manager 5.8. SQL Compliance Manager is the industry leading SQL Server auditing solution...
Announcing Precise 10.2 General Availability
We are pleased to announce the release of Precise 10.2, the company’s application performance monitoring platform. This latest release...
What are the complications of cybersecurity in the cloud?
Cloud computing services offer many advantages for companies or organizations that make use of them. There are often financial incentives involved...
Sophisticated Battery Report
If your laptop battery is going low too soon, or you’d like to investigate related issues, there is a simple way to generate an extensive...
Tuning Your MySQL Databases for Better Performance
The tremendous popularity of the open-source relational database solution known as MySQL shows no signs of slowing down. As of June 2020, the only...
What do you need to know about security threats for SQL Server?
Today, organizations are about data. Database systems and the elements they store are arguably the most valuable assets in any given enterprise. Not...
Adding PowerShell commands for SharePoint
The PowerShell Gallery provides easy access to additional PowerShell commands. For example, you can download and install the command extension for...
Why will your SQL Server service not start?
The executable process that is the SQL Server Database Engine is called the Database Engine service. The Database Engine service is an executable...
What are the top cluster setup mistakes for SQL Server?
Windows Failover Clustering can keep your SQL Server databases online and your customers happy when hardware or operating system problems strike....
Defragment Your Indexes For Better Database Performance
Providing information is the most fundamental purpose of a database. This is accomplished through queries that are submitted by the database’s...
Adding PowerShell commands for Azure
To manage and automate your assets in the Azure cloud, you can easily install a free PowerShell module which comes with a wealth of new PowerShell...
How can you prevent SQL Server intrusions?
Understanding how SQL Server can be infiltrated is the key to understanding how to prevent intrusions. The consequences for inadequate permissions...
Finding the Best Way to Present Your Data
Modern organizations use their data resources for many essential activities. The information contained in enterprise databases is used to drive...
Showing Wi-Fi SSIDs
In the previous tip we illustrated how you can dump all Wi-Fi profile names using netsh.exe. Typically, profile names and SSIDs are identical....
The Value of an IT Capacity Planning Strategy
Planning to ensure that requirements are met is a practice that is performed in many different situations. The need to accurately plan manifests...
How should you handle the complexities of regulatory compliance?
The reliance on digitally stored information continues to grow and now dominates society in the 21st Century. The use of the Internet for business...
Dumping Wi-Fi Passwords
In the previous tip we used netsh.exe to dump Wi-Fi profiles. Let’s take it a step further and expose the cached passwords: # get cleartext...
Which items do you need to audit in SQL Server?
SQL Server provides robust capabilities to monitor itself, and it can be easy to be overwhelmed with the choices presented through catalog or...
It is Never a Bad Time to Revisit User Permissions
A database needs users to provide any value to an organization. While it might be instructive from an academic point of view to simply collect large...
How can you balance database security and database performance?
The security of any database can be improved. However, that likely degrades the performance of the database. The cost increases to improve database...
Showing Wi-Fi Profiles
PowerShell is not limited to cmdlets and can run executables. For example, there is no built-in cmdlet to list the existing Wi-Fi profiles, but...
Addressing Out of Control SQL Server Sprawl Effectively
Data is the driving force in business these days. Organizations rely on their information resources to make informed decisions regarding all aspects...
The Benefits of Using a Unified Interface
Individuals in many different fields of endeavor make use of tools or processes that exhibit a certain degree of consistency. Finding something that...