Tag: Database & Technology

An important part of planning task flows for deployment within WebCenter Portal is the correct scoping of your Managed Beans.  In this Quick Tip, we will discuss the usages of each of the scopes available within ADF and some best practices around the scoping; as well as discuss some of the already-available beans within WebCenter…

An important part of planning task flows for deployment within WebCenter Portal is the correct scoping of your Managed Beans.  In this Quick Tip, we will discuss the usages of each of the scopes available within ADF and some best practices around the scoping; as well as discuss some of the already-available beans within WebCenter…

Exadata has been come the engineered system of choice when talking about high performance and databases.  Although Exadata is a great system, Oracle recommends that health checks be performed on an Exadata at least once a month to ensure performance and reliability of the system.  With this expectation Oracle provides a utility called Exachk.  ExaChk…

Exadata has been come the engineered system of choice when talking about high performance and databases.  Although Exadata is a great system, Oracle recommends that health checks be performed on an Exadata at least once a month to ensure performance and reliability of the system.  With this expectation Oracle provides a utility called Exachk.  ExaChk…

For any mission critical environment, the application release is one of the DBA challenges due to downtime that it imposes. Edition Based Redefinition (EBR)  as well as GoldenGate could be solution which could tackle the issue in a different way to resolve. This lecture walks the audience through in-depth analysis which was done for both technologies and…

For any mission critical environment, the application release is one of the DBA challenges due to downtime that it imposes. Edition Based Redefinition (EBR)  as well as GoldenGate could be solution which could tackle the issue in a different way to resolve. This lecture walks the audience through in-depth analysis which was done for both technologies and…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…

Compliance, internal security requirements are all putting pressure on keeping the organizations data safer from insiders as well as outsiders.  We as database administrators must bring to the table ways to keep the database data safer and more secure then every before.  In this presentation we will examine technology as well as process and procedures…