Tag: Database
The Rule Based Data Archiving process solves the business challenges of cost efficient, readily available, fits for all data archiving demands. In addition, this innovative home-grown tool facilitates the on-demand restore of the archived data to any Oracle database irrespective of the table structure changes since the archiving of the data. This tool works even…
-
- Whitepapers & presentations
- 9/21/12
The Rule Based Data Archiving process solves the business challenges of cost efficient, readily available, fits for all data archiving demands. In addition, this innovative home-grown tool facilitates the on-demand restore of the archived data to any Oracle database irrespective of the table structure changes since the archiving of the data. This tool works even…
-
- Whitepapers & presentations
- 9/21/12
The Rule Based Data Archiving process solves the business challenges of cost efficient, readily available, fits for all data archiving demands. In addition, this innovative home-grown tool facilitates the on-demand restore of the archived data to any Oracle database irrespective of the table structure changes since the archiving of the data. This tool works even…
-
- Whitepapers & presentations
- 9/21/12
You did everything by the book, followed the database security checklists, and implemented security best practices, but one day you find significant security issues in one of your databases. How did this happen? After auditing hundreds of databases, I have compiled a list of common database security mistakes and potentials causes of each mistake. Common…
-
- Whitepapers & presentations
- 9/21/12
The Rule Based Data Archiving process solves the business challenges of cost efficient, readily available, fits for all data archiving demands. In addition, this innovative home-grown tool facilitates the on-demand restore of the archived data to any Oracle database irrespective of the table structure changes since the archiving of the data. This tool works even…
-
- Whitepapers & presentations
- 9/21/12
You did everything by the book, followed the database security checklists, and implemented security best practices, but one day you find significant security issues in one of your databases. How did this happen? After auditing hundreds of databases, I have compiled a list of common database security mistakes and potentials causes of each mistake. Common…
-
- Whitepapers & presentations
- 9/21/12
You did everything by the book, followed the database security checklists, and implemented security best practices, but one day you find significant security issues in one of your databases. How did this happen? After auditing hundreds of databases, I have compiled a list of common database security mistakes and potentials causes of each mistake. Common…
-
- Whitepapers & presentations
- 9/21/12
Many times during a project life cycle, new technology is introduced that presents first time challenges. The author will describe a project using Oracle XML DB and discuss why XML DB was chosen, how XML DB was used, and the technical issues encountered. The author will provide several examples using XMLTYPE, CLOBs, XML DB methods,…
-
- Whitepapers & presentations
- 9/21/12
You did everything by the book, followed the database security checklists, and implemented security best practices, but one day you find significant security issues in one of your databases. How did this happen? After auditing hundreds of databases, I have compiled a list of common database security mistakes and potentials causes of each mistake. Common…
-
- Whitepapers & presentations
- 9/21/12
Many times during a project life cycle, new technology is introduced that presents first time challenges. The author will describe a project using Oracle XML DB and discuss why XML DB was chosen, how XML DB was used, and the technical issues encountered. The author will provide several examples using XMLTYPE, CLOBs, XML DB methods,…
-
- Whitepapers & presentations
- 9/21/12