Tag: IOUG

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

Oracle Identity Governance is a powerful product suite that can provide great value to a company including user self service, reduction of manual overhead, centralized user administration, and analytic features that monitor access and ensure compliance with industry and regulatory standards. A typical implementation is more complex than most organizations realize, and it is important…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

You know all there is to know about Oracle 12c. You’ve done data guard and RAC, completed numerous disaster recovery tests, and restored your fair share of environments. Now what? Terrific technical skills are no longer enough to keep your job, get great annual reviews, and get a great annual raise. You need to manage…

In June 2013, Edward Snowden triggered the most costly insider security leak in history, forcing organizations to completely rethink how they secure their infrastructure. Join Paul Vallée, founder of Pythian, to learn how he supervises over 200 database and system administrators as they perform work on the some of the world’s most valuable and mission-critical…

In June 2013, Edward Snowden triggered the most costly insider security leak in history, forcing organizations to completely rethink how they secure their infrastructure. Join Paul Vallée, founder of Pythian, to learn how he supervises over 200 database and system administrators as they perform work on the some of the world’s most valuable and mission-critical…

Ever wondered why one day your query is performing well and the next it is not? And you know that nothing has changed - or has it? Finding the root cause can be frustrating and sometimes the answers are subjective such as: maybe there are more data or someone must have made a change to…

Original Broadcast: 3.19.2014 Databases only perform as well as the systems they run on. Designing a system to power a true high performance database requires design choices that offer extreme performance, interoperability, availability and specific knowledge of tuning parameters that help streamline the operation of the database. The engineering resources and expertise required to design…

Original Broadcast: 3.19.2014 Databases only perform as well as the systems they run on. Designing a system to power a true high performance database requires design choices that offer extreme performance, interoperability, availability and specific knowledge of tuning parameters that help streamline the operation of the database. The engineering resources and expertise required to design…