Tag: Database & Technology

Relational Databases are extremely sophisticated, but their extensive functionality makes it challenging for them to achieve hyperscale. Some have turned to alternative technologies such as key value stores, which exclude most of the functionality of Relational Databases in order to make scaling easier. However, increasingly more people are seeking a solution that achieves extreme scalability…

Recent Oracle Database releases include significant new features that streamline user administration, reduce database attack surfaces, and protect personally identifiable information, and other sensitive data. In this session learn about the new way to authenticate and authorize database users in Active Directory. Explore review recent security innovations including privilege analysis, database vault simulation mode, data…

Get hands-on and learn the features of the Python cx_Oracle interface for Oracle Database. In this session learn efficient techniques for connection management, statement handling, and more. If you want to use Python and Oracle Database, this session is for you. Basic programming skills in any language are required.

This presentation will look at which 19c new features that should be investigated for use.  This presentation will also look at which 18c new features that should be investigated for use (such as Snapshot Carousel, PDB Switchover, In-Memory External Tables, Merge Partition Online, Advances in the Approximate Query, Polymorphic Tables, Standby Nologging, and Password-less Schema Creation…

Understanding database security is critical for every DBA and beginning DBAs may not have all the necessary knowledge or resources to properly secure their databases. This session will introduce DBAs to the basics of database security and how to secure their databases by highlighting key database risks and providing resources useful in database hardening. Starting with a discussion of common database security risks and attack vectors, learn why and how your databases are under attack by both insiders and outsiders and the processes, tools, and techniques frequently used to compromise Oracle Databases. Key database features and processes impacting security including authentication, authorization, privileges, auditing, networking, security patches, and encryption will be explained highlighting both benefits and limitations of these features. The goal of this session is to show you database security in a different light in order for you to understand the most effective approach to securing your databases and highlight limitations and issues you may encounter.

Many DBAs and Architects think they understand Oracle database replication. But it is often only physical replication, as performed by Data Guard, rather than logical replication as done by GoldenGate, Streams and others. There are 3 fundamental principles that govern how these logical replication tools operate, centred on conversion, identification, and conflict handling of the…

This article, part three of a three-part series, explores a DBAs journey to APEX.

The frenetic pace of application development in modern IT organizations means it’s not unusual to demand an application be built with minimal requirements gathering – literally, from a napkin-based sketch – to a working first draft of the app within extremely short time frames – even a weekend! – with production deployment to follow just a few days later. This article – the third in this ongoing series – demonstrates how simple it is to improve a basic prototype of the existing APEX application as well as construct a simple yet functional application for volunteer canvassers to connect with registered voters in a huge northwest suburban Chicago voting district, right from their mobile devices. Missed Part 2? Catch up here first.

Recent years have shown an upshift of open source technologies with an evident increase in hybrid applications from licensed and proprietary tools. One such popular technology is Python programming language, which has made its way to the top. Most of its popularity can be attributed to the variety of options it provides for visualization and machine learning alongside the application development and automation. This article will primarily focus on how Python’s graphing libraries can be used to understand data from a database administrator’s (DBA’s) perspective.

Last month I wrote about lists and the thought process in choosing between a bulleted list versus a numbered list. Recall that I suggested using bulleted lists for collections of items, and numbered lists for sequences of steps. While that’s good advice, some cases can be spun in either direction. Sometimes the decision between a collection of items and process has more to do with your specific approach to a topic than to the nature of the list items.

If your organization is interested in moving to Cloud, but you’re not quite ready to make the transition yet, you may want to consider utilizing a Cloud trial. Customers can now test drive the Oracle Autonomous Data Warehouse on Cloud's platform through a free trial that offers $300 of free credits that are good for up to 3,500 hours of Oracle Cloud usage.