Tag: Database & Technology

In this hands-on lab, you will learn about new ways to upgrade, migrate, and consolidate databases in Oracle Database 12c. Specifically, you will; Upgrade a database to 12c, using the new command-line parallel upgrade script; Plug that database into an Oracle Database 12c container database as a pluggable database (PDB); Migrate a second database to…

Original Broadcast: February 24, 2015 10:00 a.m. - 11:00 a.m. CDT Oracle’s revolutionary Software in Silicon technology extends the design philosophy of engineered systems to the chip. Co-engineered by Oracle’s software and microprocessor engineers, Software in Silicon implements accelerators directly in the processor to deliver a rich feature-set that enables quick development of databases and…

Interactive Reports have undergone major changes in APEX 5.0, bringing big new features and significant changes behind the scenes, changes that impact all interactive reports. This session introduces the APEX 5 new features, then takes a deep dive into the structural and code changes behind the scenes that make these improvements possible,  Understanding these changes…

Interactive Reports have undergone major changes in APEX 5.0, bringing big new features and significant changes behind the scenes, changes that impact all interactive reports. This session introduces the APEX 5 new features, then takes a deep dive into the structural and code changes behind the scenes that make these improvements possible,  Understanding these changes…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Big Data insight is getting tremendous attention across all organizations but data mining and analytics are not new methodology. This presentation emphasizes on how big data technologies are helping data discovery and turning information and knowledge into wisdom. This presentation will not only help understand different types of analytic techniques using examples but also explain…