There has been an explosion of IT applications in recent years. This presents a major challenge for companies with regards to IT investments in hardware for databases. This can be dedicated database hardware for a specific set of applications, shared database hardware across all disparate applications within the organization, or a mix of both. This…

There has been an explosion of IT applications in recent years. This presents a major challenge for companies with regards to IT investments in hardware for databases. This can be dedicated database hardware for a specific set of applications, shared database hardware across all disparate applications within the organization, or a mix of both. This…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

The IOUG recently integrated with the Quest Oracle Community. Join this townhall to learn about Quest and how you will be able to engage in this growing community. Introduction to the Quest Community A word from John Matelski –  Former IOUG Board Member and current Quest Board Member A look at Quest Vendor Partnership Upcoming Quest…

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 8/09/19
Jul 12 @  11:00am

Join this session for an update on Oracle HCM Cloud 19C. Presented by Oracle Cloud Customer Connect. Topics 1.       Unified Sandboxes: Capabilities, and Keys for Success with USB 2.       Areas of Responsibility Redesigned: Feature Highlights, and Key Customer Use Case 3.       Mobile Responsive Performance Flows: Worked Example 4.       Q&A Post your questions in this forum post before the session to have them answered…

Every now and then you need to free you mind and work on something completely different. That's where the robot comes from. This home-build robot sends all kinds of sensor data to Oracle's IoT cloud service. The data is processed in IoT CS and used to control the robot's sensor thresholds. The robot's movements, speed…

Every now and then you need to free you mind and work on something completely different. That's where the robot comes from. This home-build robot sends all kinds of sensor data to Oracle's IoT cloud service. The data is processed in IoT CS and used to control the robot's sensor thresholds. The robot's movements, speed…

Every now and then you need to free you mind and work on something completely different. That's where the robot comes from. This home-build robot sends all kinds of sensor data to Oracle's IoT cloud service. The data is processed in IoT CS and used to control the robot's sensor thresholds. The robot's movements, speed…

Every now and then you need to free you mind and work on something completely different. That's where the robot comes from. This home-build robot sends all kinds of sensor data to Oracle's IoT cloud service. The data is processed in IoT CS and used to control the robot's sensor thresholds. The robot's movements, speed…