Tag: IOUG

Application Continuity masks outages from end users and applications by recovering the in-flight work for impacted database sessions following unplanned and planned outages. Application Continuity performs this recovery beneath the application so that the outage appears to the application as a slightly delayed execution. Without Application Continuity, it is almost impossible for an application to…

Application Continuity masks outages from end users and applications by recovering the in-flight work for impacted database sessions following unplanned and planned outages. Application Continuity performs this recovery beneath the application so that the outage appears to the application as a slightly delayed execution. Without Application Continuity, it is almost impossible for an application to…

The presentation focuses on how to detect, analyze, and resolve database performance problems. This session provides a walkthrough using real-life scripts in detecting performance issues along with determining the scope of the issue. The presentation leverages several of V$ views to dig into to uncover the performance problems. The takeaway from this session is: “I…

SQLT XPLORE uses brute force analysis to explore some aspects of a SQL statement. The typical case is this: A SQL statement has a performance regression after a database software upgrade. Setting Optimizer Features to the pre-upgrade release causes the performance of the SQL to be restored, so there is a high level of confidence…

SQLT XPLORE uses brute force analysis to explore some aspects of a SQL statement. The typical case is this: A SQL statement has a performance regression after a database software upgrade. Setting Optimizer Features to the pre-upgrade release causes the performance of the SQL to be restored, so there is a high level of confidence…

This session is about how Adaptive Cursor Sharing (ACS) actually works. How a bind sensitive cursor becomes bind aware? What are those "ACS buckets"? How the "Selectivity Profile" works? Why sometimes your SQL becomes bind aware and why sometimes it does not? How is that ACS interacts with SQL Plan Management (SPM)? These and other…

Take a plunge into the technical details of Oracle Exadata. After this session, you will understand what has been done to enhance and extend the Oracle Exadata system, database architecture, and functionality and how to take maximum advantage of these new capabilities. The presentation examines in detail the Oracle Exadata hardware and software architecture, Oracle…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…

Search is a critical part of any effective content management solution. Without it, documents, web pages, policies, and other enterprise resources cannot be easily surfaced to end users. This session will explore the search technologies available to Oracle WebCenter customers including metadata-only search, Oracle Text Search, and Secure Enterprise Search, as well as the search…