Tag: Database & Technology

Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers. Therefore, implementing database encryption can be time consuming and difficult as there are performance considerations and challenges such as effective…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…

When storage indexes kick in, the number of blocks that need to be returned from the storage cells drop dramatically. Since the storage cells can provide many blocks very quickly most of the time in big accesses is usually loading that information into the compute nodes. But storage indexes don't always kick in the way…

When storage indexes kick in, the number of blocks that need to be returned from the storage cells drop dramatically. Since the storage cells can provide many blocks very quickly most of the time in big accesses is usually loading that information into the compute nodes. But storage indexes don't always kick in the way…

One of most commonly used architectures for in a database as a service (DBaaS)  cloud is virtualizing database. In this architecture, all the Oracle databases are running on virtual machines. To provide a database service, virtual machines with database preconfigured are dynamically provisioned. This session will discuss the two most commonly used virtualization methods: Oracle VM and VMware.

One of most commonly used architectures for in a database as a service (DBaaS)  cloud is virtualizing database. In this architecture, all the Oracle databases are running on virtual machines. To provide a database service, virtual machines with database preconfigured are dynamically provisioned. This session will discuss the two most commonly used virtualization methods: Oracle VM and VMware.

In this session I will share some of experience on migrate or upgrading different versions of Oracle databases to the Oracle 12cR2. This session will discuss the difference between upgrade and upgrade when you should use which method. We will also focus the latest 12cR2 upgrade tools and various upgrade 12cR2 paths/methods that help you…