erwin Model first, move smart: Why data modeling is the key to successful migrations Model first, move smart: Why data modeling is the key to successful migrations By Ryan Crochet | July 15, 2025 Model first, move smart: Why data modeling is the key to successful migrations Jul 15, 2025 by Ryan Crochet Does it feel like you’re gettin... Read →
Active Directory Active Directory backup strategies you need today By Darren Hanlon | July 14, 2025 Explore Active Directory backup types, storage options, and tips to ensure safe and effective recovery in disaster scenarios. Read →
Performance Monitoring Now Available: Foglight®︎ Cloud – Smarter Query Tuning and Broader Cloud Database Monitoring By Lior.Asta | July 13, 2025 We’re proud to announce the general availability of Foglight® Cloud, the latest evolution of Quest’s powerful database monitoring and optimization... Read →
Performance Monitoring Finding Oracle PGA Memory Hogs with Foglight: A Practical Guide By yossi nixon | July 10, 2025 The Problem: When PGA Memory Goes Wild Recently, a customer approached us with a common yet challenging issue: “We have many queries consuming a lot... Read →
erwin erwin Data Modeler 15.0 bridges the data modeling and engineering gap Introducing erwin Data Modeler 15.0: Bridging the Gap Between Data Modeling & Data Engineering By Ryan Crochet | July 9, 2025 Introducing erwin Data Modeler 15.0: Bridging the Gap Between Data Modeling & Data Engineering Jul 9, 2025 by Ryan Crochet The data landsca... Read →
Security It’s the end of support for Windows 10. Do you feel fine? Or will you be fined? By Jillian Salamon | June 30, 2025 The Windows 10 end-of-support deadline is almost here. Learn why planning is critical to avoid security and compliance risks. Read →
Data Operations Snowflake Summit: Key takeaways from a week of AI, data and dog robots By Randy Rouse | June 25, 2025 Here are the key takeaways from Snowflake Summit 2025 – the emphasis was on AI integration into every stage of the data lifecycle. Read →
Active Directory 5 Active Directory security best practices for the modern threat landscape By Bastiaan Verdonk | June 23, 2025 Discover five essential Active Directory security best practices to defend against modern identity-based threats and insider privilege abuse. Read →