Tag: Database & Technology

SQLT XPLORE uses brute force analysis to explore some aspects of a SQL statement. The typical case is this: A SQL statement has a performance regression after a database software upgrade. Setting Optimizer Features to the pre-upgrade release causes the performance of the SQL to be restored, so there is a high level of confidence…

This session is about how Adaptive Cursor Sharing (ACS) actually works. How a bind sensitive cursor becomes bind aware? What are those "ACS buckets"? How the "Selectivity Profile" works? Why sometimes your SQL becomes bind aware and why sometimes it does not? How is that ACS interacts with SQL Plan Management (SPM)? These and other…

Take a plunge into the technical details of Oracle Exadata. After this session, you will understand what has been done to enhance and extend the Oracle Exadata system, database architecture, and functionality and how to take maximum advantage of these new capabilities. The presentation examines in detail the Oracle Exadata hardware and software architecture, Oracle…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…