Tag: IOUG

Learn from Oracle GoldenGate Product Management on the new GoldenGate 18c features, including a deeper dive into the new Microservices Architecture for automing Oracle GoldenGate.  And discuss enhancements related to Active-Active replication including the new Automatic Conflict Detection and Resolution features.

Oracle Database 19c is now available, and it builds on Oracle Databases 19c and 12cR2. This session explores how developers and DBAs can work together to start using 10 of the top ( and mostly free)  features that make it easier to get the job done.

Oracle Database 19c is now available, and it builds on Oracle Databases 19c and 12cR2. This session explores how developers and DBAs can work together to start using 10 of the top ( and mostly free)  features that make it easier to get the job done.

  Use the innovative Dynamic Oracle Performance Analytics (DOPA) approach that relies on big data and advanced analytical techniques to analyze and improve Oracle Database performance. The approach discussed in this presentation is accessible and easy to use, but more importantly it represents a step-change paradigm shift away from traditional methods. Instead of relying on…

  Transform your ability to quickly respond to the challenge of ensuring high performing DB’s. The key to this transformation is to expertly use the advisor framework which underlies tools such as ADDM, SQL Tuning Advisor, Segment Tuning.  These tools provide actionable advice to the DBA seeking to solve performance problems, but getting at this…

The cost of data breaches and data proliferation continues to grow year after year. As DBAs, it is our job to protect the data. A great place to learn more about data security and network with other DBAs is at COLLABORATE 2019, which has 18 sessions featuring database security topics. You can learn to use the features, functionality, and applications available from Oracle to reduce the possibility of unauthorized access to data by hackers or internal users.

This article provides a firm foundation of why you need to secure your database, as well as tips on how to get started. Think of this as a prelude to my COLLABORATE session, “Why Your Database is Not Secure,” which will help you learn how to leverage security information you gather to propose and implement changes to increase the security of your data.

The cost of data breaches and data proliferation continues to grow year after year. As DBAs, it is our job to protect the data. A great place to learn more about data security and network with other DBAs is at COLLABORATE 2019, which has 18 sessions featuring database security topics. You can learn to use the features, functionality, and applications available from Oracle to reduce the possibility of unauthorized access to data by hackers or internal users.

This article provides a firm foundation of why you need to secure your database, as well as tips on how to get started. Think of this as a prelude to my COLLABORATE session, “Why Your Database is Not Secure,” which will help you learn how to leverage security information you gather to propose and implement changes to increase the security of your data.

This article, part three of a three-part series, explores a DBAs journey to APEX.

The frenetic pace of application development in modern IT organizations means it’s not unusual to demand an application be built with minimal requirements gathering – literally, from a napkin-based sketch – to a working first draft of the app within extremely short time frames – even a weekend! – with production deployment to follow just a few days later. This article – the third in this ongoing series – demonstrates how simple it is to improve a basic prototype of the existing APEX application as well as construct a simple yet functional application for volunteer canvassers to connect with registered voters in a huge northwest suburban Chicago voting district, right from their mobile devices. Missed Part 2? Catch up here first.

This article, part three of a three-part series, explores a DBAs journey to APEX.

The frenetic pace of application development in modern IT organizations means it’s not unusual to demand an application be built with minimal requirements gathering – literally, from a napkin-based sketch – to a working first draft of the app within extremely short time frames – even a weekend! – with production deployment to follow just a few days later. This article – the third in this ongoing series – demonstrates how simple it is to improve a basic prototype of the existing APEX application as well as construct a simple yet functional application for volunteer canvassers to connect with registered voters in a huge northwest suburban Chicago voting district, right from their mobile devices. Missed Part 2? Catch up here first.

Recent years have shown an upshift of open source technologies with an evident increase in hybrid applications from licensed and proprietary tools. One such popular technology is Python programming language, which has made its way to the top. Most of its popularity can be attributed to the variety of options it provides for visualization and machine learning alongside the application development and automation. This article will primarily focus on how Python’s graphing libraries can be used to understand data from a database administrator’s (DBA’s) perspective.