Tag: Database
Interactive Reports have undergone major changes in APEX 5.0, bringing big new features and significant changes behind the scenes, changes that impact all interactive reports. This session introduces the APEX 5 new features, then takes a deep dive into the structural and code changes behind the scenes that make these improvements possible, Understanding these changes…
-
- Whitepapers & presentations
- 3/01/15
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…
-
- Whitepapers & presentations
- 2/28/15
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…
-
- Whitepapers & presentations
- 2/28/15
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…
-
- Whitepapers & presentations
- 2/28/15
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…
-
- Whitepapers & presentations
- 2/28/15
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…
-
- Whitepapers & presentations
- 2/28/15
This presentation will look at which 12c new features should be investigated for use. Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer. There will be simple examples (such as a quick example using pluggable…
-
- Whitepapers & presentations
- 2/27/15
This presentation will look at which 12c new features should be investigated for use. Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer. There will be simple examples (such as a quick example using pluggable…
-
- Whitepapers & presentations
- 2/27/15
This presentation will look at which 12c new features should be investigated for use. Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer. There will be simple examples (such as a quick example using pluggable…
-
- Whitepapers & presentations
- 2/27/15
Learn the secrets of the trade to rapidly provisioning Linux, Oracle Clusters (Grid Infrastructure) and RAC and Single Instance Databases in minutes. After attending this session, you will look like a magician with your colleagues as you will learn the backend nitty gritty of provisioning Linux-As-A-Service, RAC-As-A-Service, and Database-As-A-Service, Advanced techniques to deploy enterprise RAC…
-
- Whitepapers & presentations
- 2/27/15