• 21 Feb 2017

    The Future of Business Intelligence

    Business intelligence (BI) has long been associated with applications: dashboards and user tools for viewing and interacting with reports, and analyst tools for querying databases, analyzing, and modeling the results. Today a large number of these tools and software are designed to make it easier to visualize data and digest insights from it, both proprietary and open source. In many industries, the role and act of...
    • 21 Feb 2017

    Two additional free powerful Toad Data Point tools available to use

    In this blog, I would like to focus on an article that Toad Data Point Product Manager, Julie Hyman, shared within the Toad World community. These two tools are the Toad Intelligence Central Community Edition and the Toad Data Point Viewer . Many users may not be aware that these tools are readily available to use and they are free. Yes, absolutely free! Centrally Publish and Share Your Work with Toad Intelligence...
    • 20 Feb 2017

    The Importance of Performance Benchmarking to Decrease Op Ex

    Throughout my career I have conversed with many IT leaders that have adopted the practice of measuring the performance of their technology assets by monitoring key performance indicators (or KPIs). Most of them will tell you that there needs to be some standard against which KPIs are measured and compared. The process of comparing a set of key performance metrics against some kind of objective standard is a form of benchmarking...
    • 17 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 4)

    Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
    • 17 Feb 2017

    How to limit the amount of Cache memory used by Exchange Servers using PowerShell with applications to Rapid Recovery (post 1 of 3)

    A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that particular setup, due to the memory-hog behavior of Exchange, other applications including our own Rapid Recovery agent were not performing properly. I suggested that we may attempt reducing the Exchange memory consumption and he offered me his own company environment...
    • 15 Feb 2017

    Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Organizations are sprinting to Office 365 . In fact, tech research firm, the Radicati Group, forecasts 5x growth by 2019. For sure, some organizations will be 100-percent cloud, but many are so heavily invested in legacy infrastructure that they will...
    • 15 Feb 2017

    Stat Logging Levels and Their Effect? Affect? Impact!

    Stat Logging Levels can have a major affect on migration performance… { Hmm… Doesn’t look right. } Stat Logging Levels can have a major effect on migration performance... { Nope… Sounds wrong. } Stat Logging Levels can have a major impact on migration performance… {Lazy… I’ll change it later…} Affect? Effect? Ugh… I’m pretty sure I missed class when...
    • 14 Feb 2017

    Shared LOVE between Toad and Toad Intelligence Central – The Power Couple

    It’s Valentine’s Day, and power couples everywhere are celebrating. Have you noticed how the biggest power couples share the love by dedicating themselves to a worthy cause? Mark and Priscilla focus on human potential and equality . Beyonc...
    • 14 Feb 2017

    Getting Organized Using Toad

    Toad has so many features and RDBMS' have so many objects it can sometimes be difficult to mesh them together to accomplish the tasks at hand. Wouldn't it be great if there were ways to have these organized in the way you need vs ...
    • 13 Feb 2017

    One Identity User Conference in Lisbon, Portugal

    Join us for the One Identity User Conference April 5-6th, 2017| Lisbon, Portugal Register Now Build on Your Identity Manager and Privileged Management Knowledge Attend this informative and educational event to learn, share and collaborate. Plus this event will give you the latest insights into Identity Manager and our Privileged Management solutions, as well as expose you to lively discussions about key industry...
    • 13 Feb 2017

    Managing Identities in the Hybrid World of Azure AD

    By Tim Eichmann, Head of Infrastructure & Cloud Services, Core Technology Systems (UK) Limited Whatever your opinion is on the cloud and how secure it is for data storage, one thing that holds true is that a lot of cloud services are now moving into cheap ‘commodity’ territory. We are seeing around a 90 per cent adoption rate by businesses of cloud-based systems. This number continues to grow as the...
    • 13 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 3)

    Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...