Tag: Database
Containers have taken the IT world by storm, and for good reason. The reduction in setup time, administration time, and resource consumption that containers provide makes a very strong case for using container technologies throughout the data center. Docker can be used to containerize many applications, including the Oracle Database. While Oracle Database is not…
-
- Whitepapers & presentations
- 4/03/17
All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic. However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management? Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…
-
- Whitepapers & presentations
- 4/03/17
All DBAs have OS and DB based scripts for performing tasks such as monitoring, backups, or application logic. However, are these scripts implemented as securely as possible without using some home-grown solution for DB credential management? Or are they a weak point or possible exposure in your organization's security implementation? This presentation discusses how to…
-
- Whitepapers & presentations
- 4/03/17
In this presentation, we will explore various internal topics to better understand RAC Grid Infrastructure clusterware better. I will explore the background processes, startup sequence, resources, and attributes of the resources. Then, we will explore various log files of the background processes and explain how to use the log files to better understand the Grid…
-
- Whitepapers & presentations
- 4/03/17
The AWR provides a plethora of information. Many times DBAs and perforance analysts will become overwhelmed with the shear amount of data presented. Thie presentation will provide a glimpse of ten or more performance robbing statistics and indicators that every analyst should check for when reviewing AWR reports.
-
- Whitepapers & presentations
- 4/03/17
Oracle Multitenant was built to consolidate databases. The provisioning and management advantages of using pluggable databases greatly simplify database operations. However, accidental or intentional acts can create security breaches with pluggable databases. This session will review briefly the features and functionality introduced by the multitenant option. We will then discuss changes to basic database security…
-
- Whitepapers & presentations
- 4/03/17
There are several Oracle Database security options that are available to secure the environment and provide data protection from unauthorized access. In creating a database environment that is available as a service, the security should be built in for deployment. The Database Cloud changes how the role of the DBA manages and implements security. This…
-
- Whitepapers & presentations
- 4/03/17
Oracle Multitenant was built to consolidate databases. The provisioning and management advantages of using pluggable databases greatly simplify database operations. However, accidental or intentional acts can create security breaches with pluggable databases. This session will review briefly the features and functionality introduced by the multitenant option. We will then discuss changes to basic database security…
-
- Whitepapers & presentations
- 4/03/17
In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components. There were also various layouts to the information provided within those audit trails. Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view. This framework is more secure…
-
- Whitepapers & presentations
- 4/03/17
Oracle Database security patches are not routinely applied by many organizations due to business limitations regarding patching or due to lack of security patches for desupported database versions. All database versions 11.2.0.3 and prior are under Sustaining Support and no Critical Patch Updates (CPU) are available for these versions. There are significant security risks when…
-
- Whitepapers & presentations
- 4/03/17