Data Operations Data lakehouse architecture: Ensure AI can understand and trust your data By Yetkin Ozkucur | August 4, 2025 To scale AI with confidence, your data lakehouse architecture needs strong modeling and governance for structure, trust and traceability. Read →
Database Management Breaking down data silos: How SharePlex 12.1 gets your legacy data into modern analytics and AI By daniel schrijver | July 31, 2025 Organizations are racing to modernize their data setups, with 82.6% targeting modern deployments by the end of 2025. Yet many hit the same wall... Read →
Toad Maximize vertical space in Toad Data Point By Marija Stojanovic | July 29, 2025 Hey there, fellow data pointers! 👋 Ever feel like your app’s interface is just a bit too… crowded? In Toad Data Point, where data is king, screen... Read →
Security Are unmanaged devices exposing gaps in your IT asset inventory? By Jillian Salamon | July 28, 2025 Uncover security risks from device discovery gaps—and learn how regular scans can keep your IT asset inventory up to date. Read →
Microsoft Platform Management ToolShell is a warning shot: Why legacy systems put your security at risk By Gary Hughes | July 24, 2025 The ToolShell exploit (CVE-2025-53770) didn’t just expose a SharePoint vulnerability; it exposed the real threat tied to aging infrastructure and... Read →
Performance Monitoring Mind the Gap: How Foglight 8.0 Delivers on the Promise of Database Observability By daniel schrijver | July 24, 2025 Back in May, Amit Parikh wrote about the four ways to transform your business in the ROI of proactive database observability. We're excited to share... Read →
Performance Monitoring AI Alarms now in Foglight for Databases v. 8 By David Orlandi | July 23, 2025 AI adoption is accelerating at an alarming pace (you'll see what I did there), revolutionizing industries and fundamentally changing how companies... Read →
Migration How application assessment drives smarter business strategies By Joe Tobias | July 23, 2025 Discover what an application assessment is, the key use cases for it, what the process involves, and the best practices for success. Read →