Thomas LaRock: "Without a basic understanding of wait events and how the occur, you will waste a lot of time trying and guessing at how to improve the performance of a query."
- By Gladys Rama, David Ramel
- 10/29/2024
For starters, it's time to throw out the concept of regular password expirations.
Don't underestimate the impact of "double extortion," warns a top Microsoft cloud security architect.
Leonard Lobel breaks down how the Data API Builder allows developers to effortlessly expose database objects such as tables, views and stored procedures as fully functional APIs.
- By Gladys Rama, Chris Paoli
- 10/17/2024
Security is everyone's job, but in a time when data is king, SQL Server admins play a more critical role than ever in their organizations' security postures.
Device management expert Michael Niehaus discusses the benefits and limits of image-based deployments, when to use Autopilot, and how to keep your Windows skills sharp.
If a Copilot lands in your environment and no one uses it, does it make a sound?
SQL Server Expert Allan Hirt breaks down the hurdles organizations still face when keeping on top of patching and updates.
- By Gladys Rama, Chris Paoli
- 09/24/2024
Token-based authentication is secure, but not immune to attack. Learn how you can better guard your organization.
- By Gladys Rama, Chris Paoli
- 09/23/2024
AWS Chief Technologist John O'Neill, Sr. breaks down why Copilot has become such a dominant force for organizations, and what IT can do to further harness its usefulness.
- By Gladys Rama, Chris Paoli
- 09/20/2024
While security experts must keep an eye out on evolving threats, old vectors of attacks should not be forgotten or ignored.
- By Gladys Rama, Chris Paoli
- 09/17/2024
Automation can make IT's job a lot more simple when it comes to database management. All is needed is to take that first step.
PowerShell can be wielded for both good and evil, and knowing both sides can help you keep your organization protected.
- By Gladys Rama, Chris Paoli
- 09/05/2024
Data security's biggest threat might not come from outside attackers, but from management getting in the way.
- By Gladys Rama, Chris Paoli
- 08/14/2024
Being proactive is key to keeping your enterprise safe and your data secure. Learn more about Continuous Threat Exposure Management, and what it can do for your network.
- By Gladys Rama, Chris Paoli
- 08/06/2024
As security biometrics continue to sophisticate, many organizations are still using flawed passwords to safeguard their data. That needs to change. Now.
- By Gladys Rama, Chris Paoli
- 07/25/2024
Understanding the distinction between the two is crucial for organizations' cloud transformation.
- By Gladys Rama, Chris Paoli
- 07/08/2024
Learn how IT is utilizing home automation tools to simplify their organizational workloads.
- By Gladys Rama, Chris Paoli
- 06/19/2024
A couple of seasoned PowerShell vets break down how they see the powerful tool's next stage of evolution.
- By Gladys Rama, Chris Paoli
- 06/13/2024
The GUI, for all its faults, still has a place in IT. Infrastructure pro Greg Altman breaks down when you should rely on the GUI and what the future holds for server management.
- By Gladys Rama, Chris Paoli
- 06/04/2024