Tag: Database
This presentation will look at which 12c tuning features should be investigated for use. Many of the tuning features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer. There will be simple examples (such as a quick example using…
-
- Whitepapers & presentations
- 5/27/15
This presentation will look at which 12c tuning features should be investigated for use. Many of the tuning features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer. There will be simple examples (such as a quick example using…
-
- Whitepapers & presentations
- 5/27/15
I will discuss internal details about inmemory option, processes and memory structures, v$ views, some of the practical issues that we encountered testing a multi-terabyte database with this product. I will also discuss a few internal troubleshooting events to understand how IM is populated, scaned etc. Just for a good measure, we will also take…
-
- Whitepapers & presentations
- 5/27/15
I will discuss internal details about inmemory option, processes and memory structures, v$ views, some of the practical issues that we encountered testing a multi-terabyte database with this product. I will also discuss a few internal troubleshooting events to understand how IM is populated, scaned etc. Just for a good measure, we will also take…
-
- Whitepapers & presentations
- 5/27/15
Original Broadcast: Tuesday, May 26, 2015 Security is a concern of every IT manager and it is clear that perimeter defense, trying to keep hackers out of your network, is not enough. At some point someone with bad intentions will penetrate your network and to prevent significant damage it is necessary to make sure there…
-
- Whitepapers & presentations
- 5/26/15
Original Broadcast: Tuesday, May 26, 2015 Security is a concern of every IT manager and it is clear that perimeter defense, trying to keep hackers out of your network, is not enough. At some point someone with bad intentions will penetrate your network and to prevent significant damage it is necessary to make sure there…
-
- Whitepapers & presentations
- 5/26/15
With the rapid adoption of cloud and the emergence of thecollaborative development operations (DevOps) approach withinenterprises, there’s been a great deal of speculation and discussionon the future of the database administrator role. Some punditscited the ever-accelerating needs of enterprises to push productsand services to market as quickly as possible, and to leveragecloud solutions and automation…
-
- Whitepapers & presentations
- 5/15/15
With the rapid adoption of cloud and the emergence of thecollaborative development operations (DevOps) approach withinenterprises, there’s been a great deal of speculation and discussionon the future of the database administrator role. Some punditscited the ever-accelerating needs of enterprises to push productsand services to market as quickly as possible, and to leveragecloud solutions and automation…
-
- Whitepapers & presentations
- 5/15/15
With the rapid adoption of cloud and the emergence of thecollaborative development operations (DevOps) approach withinenterprises, there’s been a great deal of speculation and discussionon the future of the database administrator role. Some punditscited the ever-accelerating needs of enterprises to push productsand services to market as quickly as possible, and to leveragecloud solutions and automation…
-
- Whitepapers & presentations
- 5/15/15
With the rapid adoption of cloud and the emergence of thecollaborative development operations (DevOps) approach withinenterprises, there’s been a great deal of speculation and discussionon the future of the database administrator role. Some punditscited the ever-accelerating needs of enterprises to push productsand services to market as quickly as possible, and to leveragecloud solutions and automation…
-
- Whitepapers & presentations
- 5/15/15