Tag: IOUG

A vibrant session with “Real Tips” for real world daily database problems a DBA could find. Here you will learn how to improve your productivity, how to solve some real DBA problems and also learn several tips to help you to become a successful DBA. This session is based on some of the most frequent…

A vibrant live session from DBAs to DBAs that will take you on an amazing trip to discover how a DBA could make the best use of all Oracle Cloud options and tools available for you (Including Backup in the Cloud and working with VPN Tunnels). Discover how Oracle Cloud works, looks and feel in…

A vibrant live session from DBAs to DBAs that will take you on an amazing trip to discover how a DBA could make the best use of all Oracle Cloud options and tools available for you (Including Backup in the Cloud and working with VPN Tunnels). Discover how Oracle Cloud works, looks and feel in…

Attendees will learn how to use the powerful and often forgotten LogMiner utility to their advantage. In this presentation you will learn how to use the Oracle LogMiner utility to increase database security, recover from logical corruption, capture user DDL and replicate your databases to DR sites and to off-prem databases in the cloud. After…

Attendees will learn how to use the powerful and often forgotten LogMiner utility to their advantage. In this presentation you will learn how to use the Oracle LogMiner utility to increase database security, recover from logical corruption, capture user DDL and replicate your databases to DR sites and to off-prem databases in the cloud. After…

What you wanted to know about the Alert Log all the time. A contribution about formats, contents, versions and differences. We will learn about different tools and also, what we can't see from this famous log file. The lecture also includes a quick overview about the components of an Oracle Database System. This allows the listener to…

What you wanted to know about the Alert Log all the time. A contribution about formats, contents, versions and differences. We will learn about different tools and also, what we can't see from this famous log file. The lecture also includes a quick overview about the components of an Oracle Database System. This allows the listener to…

This presentation is a case study that will demostrate that implementing Virtual Private Database and Database Data Vault allows data access restriction to sensitive data at table row level from all unauthorized privilged user, including SYS. Why still allowing SYS user to access and perform required database functions. Virtual Private Database (VPD) secures data from…

With the increased adoption of the Cloud, security professionals often face the challenge where they have to apply security controls efficiently for databases both on-premise and in the Cloud. This session will address the challenges related to managing audit data collection and encryption keys in hybrid scenarios, by maintaining the audit data and encryption keys…

This presentation is a case study that will demostrate that implementing Virtual Private Database and Database Data Vault allows data access restriction to sensitive data at table row level from all unauthorized privilged user, including SYS. Why still allowing SYS user to access and perform required database functions. Virtual Private Database (VPD) secures data from…