Tag: IOUG

Containers have taken the IT world by storm, and for good reason. The reduction in setup time, administration time, and resource consumption that containers provide makes a very strong case for using container technologies throughout the data center. Docker can be used to containerize many applications, including the Oracle Database. While Oracle Database is not…

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

In this presentation, we will explore various internal topics to better understand RAC Grid Infrastructure clusterware better. I will explore the background processes, startup sequence, resources, and attributes of the resources. Then, we will explore various log files of the background processes and explain how to use the log files to better understand the Grid…

In this presentation, we will review ASM , high level overview of ASM files, disks, ASM extents, and allocation units etc. Then we will review a few of ASM header structures and how ASM identifies the disks etc. We will dump headers using few tools and show the output of those dumps. We will explore…

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to…

In complex application environments, controlling privileged users and restricting direct database access are examples of the security challenges that organizations must solve in order to have a secure and compliant implementation. This session will examine how Oracle Database Vault can be used to mitigate complex security challenges within application environments.  Oracle E-Business Suite and Oracle…

In complex application environments, controlling privileged users and restricting direct database access are examples of the security challenges that organizations must solve in order to have a secure and compliant implementation. This session will examine how Oracle Database Vault can be used to mitigate complex security challenges within application environments.  Oracle E-Business Suite and Oracle…

Amazon Relational Database Service (RDS) automates many of the mundane administrative tasks required to run a database. However, migrating an existing database to the Cloud can be a tricky problem, often requiring an extended outage. In this session learn how you can leverage the AWS Database Migration Service to migrate your Oracle database to RDS with minimal downtime.…