Tag: IOUG

By 2020, sources state that for every second each human being on the planet will create an average of 1.7Mb of data and IP traffic will reach 511Tb, which is the equivalent of 142 million people streaming Internet high-definition video simultaneously, all day, every day.  With a 1/3 of that data expected to be in…

Big Data is growing exponentially, requiring massive-scale infrastructure however, business analytics has shifted from reactive to proactive analysis; this is the era of streaming data (a.k.a. Fast Data). Apache Hadoop is very good for analyzing data at rest but cannot handle streaming data. Big Data analytics needs new Big data frameworks. Apache Spark brings in-memory processing and…

Big Data is growing exponentially, requiring massive-scale infrastructure however, business analytics has shifted from reactive to proactive analysis; this is the era of streaming data (a.k.a. Fast Data). Apache Hadoop is very good for analyzing data at rest but cannot handle streaming data. Big Data analytics needs new Big data frameworks. Apache Spark brings in-memory processing and…

Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers. Therefore, implementing database encryption can be time consuming and difficult as there are performance considerations and challenges such as effective…

Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers. Therefore, implementing database encryption can be time consuming and difficult as there are performance considerations and challenges such as effective…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…

When storage indexes kick in, the number of blocks that need to be returned from the storage cells drop dramatically. Since the storage cells can provide many blocks very quickly most of the time in big accesses is usually loading that information into the compute nodes. But storage indexes don't always kick in the way…