Tag: IOUG

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber attacks penetrate the network perimeter and look for high value targets within…

Big Data insight is getting tremendous attention across all organizations but data mining and analytics are not new methodology. This presentation emphasizes on how big data technologies are helping data discovery and turning information and knowledge into wisdom. This presentation will not only help understand different types of analytic techniques using examples but also explain…

Big Data insight is getting tremendous attention across all organizations but data mining and analytics are not new methodology. This presentation emphasizes on how big data technologies are helping data discovery and turning information and knowledge into wisdom. This presentation will not only help understand different types of analytic techniques using examples but also explain…

Big Data insight is getting tremendous attention across all organizations but data mining and analytics are not new methodology. This presentation emphasizes on how big data technologies are helping data discovery and turning information and knowledge into wisdom. This presentation will not only help understand different types of analytic techniques using examples but also explain…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

This presentation will look at which 12c new features should be investigated for use.  Most of the features that will be covered will be related to the DBA, but there will also be a few outside that realm that focus on the developer.  There will be simple examples (such as a quick example using pluggable…

Learn the secrets of the trade to rapidly provisioning Linux, Oracle Clusters (Grid Infrastructure) and RAC and Single Instance Databases in minutes.  After attending this session, you will look like a magician with your colleagues as you will learn the backend nitty gritty of provisioning Linux-As-A-Service, RAC-As-A-Service, and Database-As-A-Service,  Advanced techniques to deploy enterprise RAC…