Tag: IOUG

As the complexities of Oracle solutions continue to grow, providing IT environments a simplified way to automate key processes of software delivery and changes within IT infrastructure is of utmost importance. With the use of containers, system administrators, database administrators, and software developers can take advantage of delivering Oracle databases and their closely tied applications…

Let’s revisit the ways to programmatically load data into an on-premise or Cloud Oracle database.  Many applications need to load data from external sources as some part of the workflow. What is the best data load option for your environment and your requirements?  Is your spreadsheet data CSV or true XLSX? Are you loading CLOBs…

Not that long ago it was so simple: if you were a developer who wanted to work with an Oracle development tool, you used Oracle Forms. Period. End of story. Now, and this is particularly true in the past couple of years, the number of Oracle development tools has grown to the point where it…

Not that long ago it was so simple: if you were a developer who wanted to work with an Oracle development tool, you used Oracle Forms. Period. End of story. Now, and this is particularly true in the past couple of years, the number of Oracle development tools has grown to the point where it…

Oracle Applications and their infrastructure are at the heart of your business. These application environments are built on a mix of hardware, services, business-specific code, and infrastructure. In this session learn how Oracle Management Cloud enables you to see across the entire application environment from end user to database and get the information you need…

Not that long ago it was so simple: if you were a developer who wanted to work with an Oracle development tool, you used Oracle Forms. Period. End of story. Now, and this is particularly true in the past couple of years, the number of Oracle development tools has grown to the point where it…

Proper design of an application includes security plans, which ensure that specific data is available only to specific user groups. Application design should also include security plans for guarding against data or application tampering. These two aspects can easily be set aside while developers are caught up in the process of developing PL/SQL code to…

Proper design of an application includes security plans, which ensure that specific data is available only to specific user groups. Application design should also include security plans for guarding against data or application tampering. These two aspects can easily be set aside while developers are caught up in the process of developing PL/SQL code to…

Proper design of an application includes security plans, which ensure that specific data is available only to specific user groups. Application design should also include security plans for guarding against data or application tampering. These two aspects can easily be set aside while developers are caught up in the process of developing PL/SQL code to…

This talk covers a real-world solution, that recreates database links using ORDS, REST and JSON. It breaks the limits of database links by loosely coupling two databases. The complexity is completely hidden from users and developers. Modern technologies such as REST and JSON offer elegant ways to couple databases without fixed dependencies. The protocol http(s)…