• 16 Jan 2018

    Understanding IO Issues with Spotlight on SQL Server

    Finding the statements and objects involved in your bottlenecks The modern explosion of data has created a huge demand for large volumes of storage, written and read at high speeds. The sheer size of many modern databases makes it impractical to maintain them in-memory, explaining our continued reliance on hard drives. SQL Server itself, as an ACID-compliant relational database, adds to this hard-drive intensive load...
    • 16 Jan 2018

    DR Series Appliances & LAN Free Backups

    A backup is a network resource intensive process that can negatively impact employee business needs, thus it is challenging for backup administrators to protect ever growing data capacities without impacting production. New technologies and backup methods must be examined to achieve successful backups for the future. One proven and successful backup approach is the implementation of LAN-Free backups to disk based PBBA...
    • 15 Jan 2018

    Foglight.. Start Your Engine!

    This post is short but hopefully useful. When you start the Foglight server and navigate to the home page URL (http://foglight_server:8080 or https://foglight_server:8443 ), you may see a startup splash page (below). If you see a login page, then the Foglight server has started and is ready to use. You may wonder what the startup process is doing. Or not. If you're in the former group, you can click the lower...
    • 15 Jan 2018

    System admin cheat sheet: Let KACE do the heavy lifting

    When I started out as a system admin, I wish I’d had a cheat sheet to help me keep track of everything I needed to take care of for each of my endpoints. Now, after years of experience, I’ve decided to compile some of the knowledge I’ve gained and pass it along to those who may also be in need of a cheat sheet. Whether you’re a part of a small, medium-sized or large business — or belong to...
    • 15 Jan 2018

    Agile Development: Access objects from VCS using Team Coding

    Are you using a version control system (VCS) and want to know how to access it from Toad to simplify check-out/check-in? This video shows how to check-out objects from your VCS using Team Coding and work on them in Toad. (Please visit the site to view this video) Download E-Book
    • 12 Jan 2018

    Required Ports For Spotlight

    Spotlight Diagnostic Server must be able to maintain bi-directional communication with every monitored host. Additionally, it must be capable of sending and receiving data from every Spotlight Client application in addition to sending data to any properly configured Spotlight Cloud. Spotlight utilizes designated ports for such communication protocol which facilitates the monitoring. These ports also allows for provisioning...
    • 11 Jan 2018

    Exchange 2007 is End of Life, how can Quest help?

    On April 11, 2017, Microsoft Exchange Server 2007 went End of Life and is no longer supported by Microsoft as mentioned on the Exchange Server 2007 Road Map page. What is the impact on Quest Unified Communications Analytics (UCA) and how can you use UCA to assist with your Migration to later versions of Microsoft Exchange? Final word on UCA and Microsoft Exchange Server 2007 Support for Microsoft Exchange Server...
    • 11 Jan 2018

    Office 365 Groups Recovery – How to Restore a Deleted Group?

    Office 365 Groups can be a very powerful collaboration feature that lets users choose a set of people that they wish to collaborate with, and easily set up a collection of resources for those people to share, such as an Exchange Online shared mailbox and calendar, SharePoint Online team sites and file shares, OneNote notebook, and more! By default, anyone in your organization can create Office 365 Groups. There’s...
    • 10 Jan 2018

    12 Months of Page Turning

    You probably won’t get to the end of this blog post. Or will you? Many of us realize that our attention spans are getting shorter. In a world where our reliance on smartphones dictates our daily lives and diminishes our interest in books, many of us are averse to reading more than one short paragraph. We submerse ourselves in 140 character Tweets (now 280!), or in a realm of social media channels full of videos...
    • 10 Jan 2018

    Malicious USB Drive-By Attacks and the Changing Cyber Security paradigm

    Ladies and Gentlemen, let me introduce to you a malicious USB cable. You probably met him during your last corporate conference in that nice hotel lobby... I'm kidding of course, or am I? https://twitter.com/_MG_/status/949684949614907395 I have a feeling that something changed during past couple of years - a hacker's attack on your infrastructure is almost inevitable nowadays. Take the above Human Interface...
    • 9 Jan 2018

    Diagnosing IO Latency with Foglight for Databases

    Understanding the processes and configurations causing your bottlenecks IO is the single most important metric to know for creating optimal performance of your database systems. To understand it, you’ll need to know the processes, resources and configurations involved. Here you’ll see how Foglight for Databases gives you a clear view of these in a few clicks. Foglight can alert you with an email when unusual...
    • 9 Jan 2018

    Agile Development: Checking Database Objects into Version Control Using Toad's Team Coding

    Team Coding goes beyond simply providing an easier way to use version control in Toad. Team Coding comes with some optional policies which can determine when PL/SQL objects are checked into your version control repository based on the functional integrity and quality of the code. This will help reduce the number of defects (bugs) which can make their way into production and drive up code quality standards which should...