Tag: IOUG

This week's IOUG Podcast covered Quest TOAD for Oracle 11.5, the integration of EMC DD Boost and Oracle RMAN, and how you can contribute to IOUG podcasts.

This week's IOUG Podcast covered Quest TOAD for Oracle 11.5, the integration of EMC DD Boost and Oracle RMAN, and how you can contribute to IOUG podcasts.

In this session, see how Medtronic’s iPad-based mobile content management system allows sales reps to quickly access the latest product videos, presentations, and PDFs on-the-go, while storing the information centrally and securely in Oracle WebCenter Content. By leveraging Fishbowl’s iOS Mobility Suite API, sales reps can access collateral from WebCenter within an easy-to-use iPad application.…

Even the best-planned database upgrades can leave nagging questions: what happens if my upgraded system performs unexpectedly? Is there a way I can go back to the previous version without downtime and data loss? Oracle GoldenGate allows DBAs to give affirmative answers to these questions. Drawing on upgrade experiences ranging from mid-sized databases to a…

Don't miss the final performance of Tom Kyte, Andrew Holdsworth, and Graham Wood on the IOUG Real World Performance tour!

Attend this session to get the inside track on how Oracle Exadata is monitored and managed using Oracle Enterprise Manager. Learn from a real-world implementation on how to effectively instrument and monitor your engineered systems.

Attend this session to get the inside track on how Oracle Exadata is monitored and managed using Oracle Enterprise Manager. Learn from a real-world implementation on how to effectively instrument and monitor your engineered systems.

In special situations, the Oracle Database generates too many child cursors for particular SQL-IDs. This results in high CPU load on the DB server, coming from heavy mutex access. This is visible as mutex wait events. The lecture will show how this situation arises, how the DBA can try to quick-fix it and how long-term…

Behind the scenes, Oracle APEX stores all types of different information about your applications and user access in metadata tables. This session will cover some of the wide and varied uses you can put that data to.

WikiLeaks has dramatically changed how organizations deal with data security. Without getting into the politics, this session will discuss how to mitigate data breaches in your APEX applications. It will follow your data through its “chain of custody”, and provide insights on securing it at each step. It will cover not only things to do…