Tag: Database & Technology

Our most popular request for business modeling is demand forecasting. It seems that companies everywhere are eager to avoid being blindsided by unexpected increases or decreases in product or service volume. Don’t be caught unaware— learn the straightforward science of building forecasting models that provide insight into the future direction of customer or industry behavior.…

Mar 19 @  3:00pm

Our most popular request for business modeling is demand forecasting. It seems that companies everywhere are eager to avoid being blindsided by unexpected increases or decreases in product or service volume. Don’t be caught unaware— learn the straightforward science of building forecasting models that provide insight into the future direction of customer or industry behavior.…

In this webinar, we will present a typical use case that demonstrates continuous database operations that enable alignment with application processes in a DevOps pipeline.

Feb 25 @  11:00am

Application deployments are often delayed when related database changes are required because they have traditionally followed manual processes that often result in defects which can lead to application downtime. What if you could accelerate your DevOps pipeline by converging database CI/CD with application changes, automate performance testing, monitor the performance impact of changes and replicate…

Network encryption is one of the most important security hardening strategies to be adopted in any enterprise infrastructure. It will ensure confidential data transmitted over the wire is encrypted and will prevent malicious attacks in man-in-the-middle form intended for data exfiltration. Network encryption guarantees that data exchanged between the clients (Application) and Database System or indeed between any two endpoints should be securely transmitted and transparently decrypted without fear of prying eyes. Moreover, compliance with mandatory laws like HIPAA dictates or highly recommends to implement tools of encryption of in-transit and/or at-rest data as protection from theft or malicious attacks. Oracle RDBMS Enterprise Edition offers out-of-the-box solutions to encrypt and secure over-the-wire data, and this article will compare two of these options that can be implemented in any Oracle database infrastructure.

Sasha Banks-Louie, Oracle BRANDVOICE contributor, wrote in Forbes about the top five priorities for CMOs in 2020. As chief marketing officers worldwide finalize their strategies for 2020, the force they say is influencing their marketing mix more than anything else has little to do with the traditional 4Ps of marketing. The foundation of product, promotion, price, and placement strategies is beginning to crack under pressure from customers who now value emotional connection and personal experiences more than product features and pricing incentives.

Oracle Data Safe is a fully-integrated cloud service that helps organizations secure their enterprise data with a comprehensive set of features for protecting sensitive and regulated data in Oracle Cloud. An Oracle Data Safe introductory video describes the data security challenges that organizations face and how Oracle Data Safe can address with its five main features:
-Security Assessment
-Data Discovery
-Data Masking
-User Assessment
-Activity Auditing

Gary Gordhamer, Education Director for the Quest IOUG Database & Technology Community, reflected on changes in the last decade - including IOUG's integration with Quest Oracle Community - and provided an overview of what attendees can expect from Quest IOUG Database & Technology education at COLLABORATE 20.

Tom McGinn, Learning Architect, Database User Assistance, wrote an article about the introduction of "just enough documentation," a combination of two content types - interactive diagrams and video. This concept was introduced by the Oracle Database User Assistance group with the aim of helping customers get started using Oracle's products as quickly as possible through a combination of interactivity and visual presentation. The first implementation of this approach is the Architectural Overview for Oracle Data Safe.

Jeff Erickson, Oracle BRANDVOICE Contributor, wrote in Forbes about how autonomous technology - namely Oracle's Autonomous Database - fits into a post-digital business world.