Tag: Database & Technology

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic.  However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management?  Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…

Containers have taken the IT world by storm, and for good reason. The reduction in setup time, administration time, and resource consumption that containers provide makes a very strong case for using container technologies throughout the data center. Docker can be used to containerize many applications, including the Oracle Database. While Oracle Database is not…

All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic.  However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management?  Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…

All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic.  However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management?  Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…

In this presentation, we will explore various internal topics to better understand RAC Grid Infrastructure clusterware better. I will explore the background processes, startup sequence, resources, and attributes of the resources. Then, we will explore various log files of the background processes and explain how to use the log files to better understand the Grid…

The AWR provides a plethora of information. Many times DBAs and perforance analysts will become overwhelmed with the shear amount of data presented. Thie presentation will provide a glimpse of ten or more performance robbing statistics and indicators that every analyst should check for when reviewing AWR reports.

Oracle Multitenant was built to consolidate databases. The provisioning and management advantages of using pluggable databases greatly simplify database operations. However, accidental or intentional acts can create security breaches with pluggable databases. This session will review briefly the features and functionality introduced by the multitenant option. We will then discuss changes to basic database security…

There are several Oracle Database security options that are available to secure the environment and provide data protection from unauthorized access. In creating a database environment that is available as a service, the security should be built in for deployment. The Database Cloud changes how the role of the DBA manages and implements security. This…