Featured Blog
Empowering Law Firms: How SQL Server and Idera Tools Safeguard Legal Data
Lessons Learned From 3 Years in the Trenches with AWS
Since the time of our founding, IDERA has been using Amazon Web Services (AWS). It was critical to us to use cloud technologies to build our...
What Are the Risks of Paying for Ransomware?
Ransomware is a particularly nasty type of malware that is being deployed with increased frequency over the past several months. In a ransomware...
Why DBAs Need to Look for Trouble
In some professions, individuals are expected to wait patiently until called upon to perform their functions. There are no opportunities for people...
The Best Way to Use Your Monitoring Software
Many businesses rely on extensive and complex computing environments to run daily operations, service customers, and store valuable data resources....
Making Time Using Temporal Data
SQL is the first programming language with temporal data types. The SQL-92 standard added temporal data to the language, acknowledging most of what...
How to Secure Your SQL Servers from Internal Threats
The tremendous value of enterprise data resources makes them an inviting target for malicious actors. Losing sensitive financial or personal data...
Oracle 19.7 on Linux and Oracle 19.8 on Solaris is supported in Precise 10.2
Precise 10.2 now supports the latest Oracle 19C patches for Linux and Solaris. Linux Oracle 19.7 on Linux is now supported in Precise 10.2See the...
Tips on How to Become a SQL Server Database Administrator
The increased focus that organizations are placing on their data resources has put a premium on their use of database technology. Making productive...
Oracle 19.7 on Linux and Oracle 19.8 on Solaris is supported in Precise 10.2
Precise now supports the latest Oracle 19.7 patch on Linux and the Oracle 19.8 patch on Solaris. The latest patch from Oracle for Oracle 19C on...
Normalization Heuristics
Heuristics and normalization are the goals of all databases. Heuristics refers to a trial-and-error method of problem-solving used when an...
Who Do You Trust with Your SQL Servers?
Protecting enterprise data resources has never been more important. The large quantities of data that many organizations store present an inviting...
Why is MySQL So Popular for Website Development?
Most websites that provide any degree of usefulness or functionality make use of one or several databases. Whether the site is designed to simply...
Boost Productivity with an IDE for Your Database Team
Infographics provide a method of conveying a lot of information in a condensed and visual form. They are a widely-used way of capturing an...
Join the New Worldwide Embarcadero Community!
Over on the new Embarcadero Blogs site, we are compiling a directory of Delphi & C++Builder communities around the web. We will continue to...
Installing Help and Samples for RAD Studio
The Help and Samples (for both Delphi and C++) are very useful when Programming as they provide quick reference and examples of how to use different...
How to Monitor and Streamline SQL Server Jobs
One of the appeals of using SQL Server as a database platform is the functionality and productivity that can be enjoyed through the use of the SQL...
Why You Need to Defragment Your SQL Server Indexes
In the quest for optimal database performance, DBAs need to leave no stone unturned. After keeping the data resources in their systems secure, there...
All Skewed Up
Data can be skewed by its nature. How can you tell if you have skewed data in your database? And if you do, how do you handle it when writing...
Maintaining System Visibility in a Cloudburst
For those readers attracted to the title of this post in the hopes of finding a new way to cope with your vehicle’s windshield wipers in a...
Network Security is Your First Line of Defense
Securing an organization’s computing environment from malicious external actors is a critically important and extremely complex undertaking....
New and Persistent Threats to Your SQL Servers
It would be nice if there existed some methodology that enabled DBAs to fully protect their SQL Server environment from hackers, malware, and...
3 Libraries for improving Existing Applications built with Delphi
One topic I get increasingly asked about Delphi Programming when developers are migrating to the latest version of RAD Studio is “quick ways to...
Relational Division
Dr. Codd’s original relational algebra had eight basic operations. Since relational database management systems are based on set theory, the...
Setting up the IDE for your First Android App
I have had a growing number of customers asking recently about getting started with Android programming with Delphi, so I thought it was a good time...
Secure MySQL Databases with These Best Practices
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
Best Practices for Securing MySQL Databases
Organizations that make efforts to secure MySQL databases can massively mitigate the risk of suffering a data breach. The escalating number of data...
The Right Tools Makes All the Difference
The earliest evidence of the ancient use of tools goes back to about 2.6 million years ago. Basic stone implements were one of the driving forces...
How can you handle the complexities of analytics for big data for healthcare?
Analytics for big data rapidly has become indispensable for nearly all clinical and operational processes in the healthcare industry. Such functions...
What are the real benefits of database automation?
Many of the administrative tasks required to keep databases operating efficiently need to be performed regularly. While in some respects, these...
An Efficient Solution for Multi-Platform Environments
One of the challenges that database teams face every day is keeping up with their responsibilities in multi-platform environments. In many shops, a...