Tag: Database & Technology

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to…

In complex application environments, controlling privileged users and restricting direct database access are examples of the security challenges that organizations must solve in order to have a secure and compliant implementation. This session will examine how Oracle Database Vault can be used to mitigate complex security challenges within application environments.  Oracle E-Business Suite and Oracle…

In complex application environments, controlling privileged users and restricting direct database access are examples of the security challenges that organizations must solve in order to have a secure and compliant implementation. This session will examine how Oracle Database Vault can be used to mitigate complex security challenges within application environments.  Oracle E-Business Suite and Oracle…

Amazon Relational Database Service (RDS) automates many of the mundane administrative tasks required to run a database. However, migrating an existing database to the Cloud can be a tricky problem, often requiring an extended outage. In this session learn how you can leverage the AWS Database Migration Service to migrate your Oracle database to RDS with minimal downtime.…

The AWR provides a plethora of information. Many times DBAs and perforance analysts will become overwhelmed with the shear amount of data presented. Thie presentation will provide a glimpse of ten or more performance robbing statistics and indicators that every analyst should check for when reviewing AWR reports.

In complex application environments, controlling privileged users and restricting direct database access are examples of the security challenges that organizations must solve in order to have a secure and compliant implementation. This session will examine how Oracle Database Vault can be used to mitigate complex security challenges within application environments.  Oracle E-Business Suite and Oracle…

Nobody likes surprises when it comes to database upgrades and migrations. Because the upgrade or migration usually is not complicated by itself, the most important task is ensuring good performance afterward. This presentation discusses a straightforward, step-by-step approach to ensure not only plan stability but also proper testing; secret tweaks; and helpful tips and tricks…

This was a Top 10 Presentation at VMorld 2016. Databases by their very nature are Monster VM’s. If Monster VM’s are not virtualized properly they will never perform well and can negatively performance of other VM’s on the hosts. In this presentation we will teach you how to properly virtualize Monster VM’s with a focus on…