Read the latest blog posts
    • 21 Feb 2017

    The Future of Business Intelligence

    Business intelligence (BI) has long been associated with applications: dashboards and user tools for viewing and interacting with reports, and analyst tools for querying databases, analyzing, and modeling the results. Today a large number of these tools and software are designed to make it easier to visualize data and digest insights from it, both proprietary and open source. In many industries, the role and act of...
    • 21 Feb 2017

    Two additional free powerful Toad Data Point tools available to use

    In this blog, I would like to focus on an article that Toad Data Point Product Manager, Julie Hyman, shared within the Toad World community. These two tools are the Toad Intelligence Central Community Edition and the Toad Data Point Viewer . Many users may not be aware that these tools are readily available to use and they are free. Yes, absolutely free! Centrally Publish and Share Your Work with Toad Intelligence...
    • 20 Feb 2017

    The Importance of Performance Benchmarking to Decrease Op Ex

    Throughout my career I have conversed with many IT leaders that have adopted the practice of measuring the performance of their technology assets by monitoring key performance indicators (or KPIs). Most of them will tell you that there needs to be some standard against which KPIs are measured and compared. The process of comparing a set of key performance metrics against some kind of objective standard is a form of benchmarking...
    • 17 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 4)

    Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
    • 17 Feb 2017

    How to limit the amount of Cache memory used by Exchange Servers using PowerShell with applications to Rapid Recovery (post 1 of 3)

    A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that particular setup, due to the memory-hog behavior of Exchange, other applications including our own Rapid Recovery agent were not performing properly. I suggested that we may attempt reducing the Exchange memory consumption and he offered me his own company environment...