Data Operations The ROI of proactive database observability: Four ways to transform your business By Amit Parikh | May 26, 2025 Learn how database observability drives ROI and resilience by improving performance, reducing costs, and minimizing risk. Read →
Active Directory Understanding and remediating the BadSuccessor vulnerability By Aaron Smith | May 23, 2025 Learn how the BadSuccessor vulnerability enables privilege escalation through dMSAs and what steps you can take to detect and prevent it. Read →
Migration AI log analysis: how it works, its key benefits and how it improves migrations By Joe Sharmer | May 19, 2025 Discover how AI log analysis can help you with one particularly critical and complex task - IT migrations. Read →
Performance Monitoring How can I be alerted about blocking locks on an Oracle database. By Martin Wild | May 13, 2025 On a customer call recently and the customer was asking if our Foglight for Oracle agent included an alert for blocking locks. This is a rare... Read →
Toad 76% of DBAs fear AI will kill their jobs: Terminate your anxiety in 3 steps By Ryan Crochet | May 12, 2025 My buddy Raul said to me recently, “You know, Ryan, if AI takes over database administration, I’m pretty sure I could make it as a flutist. I can do... Read →
Data Operations Data lakehouse benefits: Why enterprises are choosing this modern data architecture By Danny Sandwell | May 12, 2025 Discover why leaders should care about the benefits of data lakehouses and why enterprises are adopting this modern data architecture. Read →
Toad Simplify workflow in Toad Data Point: Set a variable prompt list from a column By Marija Stojanovic | May 9, 2025 Hey there, fellow data pointers and workbookers! 👋 If you’re anything like me, you spend a lot of time working with data, and sometimes, it feels... Read →
Microsoft Platform Management Sensitivity labels and encryption – Migrating protected content in Microsoft 365 By Gary Hughes | May 6, 2025 As organizations increasingly adopt Microsoft Purview’s information data protection capabilities, sensitivity labels and encryption are becoming... Read →