Tag: Database

In this presentation, we will review ASM , high level overview of ASM files, disks, ASM extents, and allocation units etc. Then we will review a few of ASM header structures and how ASM identifies the disks etc. We will dump headers using few tools and show the output of those dumps. We will explore…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

Consolidating database servers can go a long way toward streamlining your IT, but it still leaves you with several different databases to back up, upgrade and monitor. In this session, you will learn how Oracle multitenant architecture can free you from riding herd over multiple databases, so you can focus on the strategic initiatives that drive…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic.  However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management?  Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…