Tag: Database

Application Continuity masks outages from end users and applications by recovering the in-flight work for impacted database sessions following unplanned and planned outages. Application Continuity performs this recovery beneath the application so that the outage appears to the application as a slightly delayed execution. Without Application Continuity, it is almost impossible for an application to…

SQLT XPLORE uses brute force analysis to explore some aspects of a SQL statement. The typical case is this: A SQL statement has a performance regression after a database software upgrade. Setting Optimizer Features to the pre-upgrade release causes the performance of the SQL to be restored, so there is a high level of confidence…

SQLT XPLORE uses brute force analysis to explore some aspects of a SQL statement. The typical case is this: A SQL statement has a performance regression after a database software upgrade. Setting Optimizer Features to the pre-upgrade release causes the performance of the SQL to be restored, so there is a high level of confidence…

This session is about how Adaptive Cursor Sharing (ACS) actually works. How a bind sensitive cursor becomes bind aware? What are those "ACS buckets"? How the "Selectivity Profile" works? Why sometimes your SQL becomes bind aware and why sometimes it does not? How is that ACS interacts with SQL Plan Management (SPM)? These and other…

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

In June 2013, Edward Snowden triggered the most costly insider security leak in history, forcing organizations to completely rethink how they secure their infrastructure. Join Paul Vallée, founder of Pythian, to learn how he supervises over 200 database and system administrators as they perform work on the some of the world’s most valuable and mission-critical…