Tag: IOUG

Part I: Virtualizing and Provisioning the Oracle ZFS Storage Appliance

In this article, we will learn how to prepare the ZFS storage appliance for the use of Oracle 19c RAC with ASM. ZFS appliance originally is a storage appliance from Oracle and falls under the family of Engineered Systems, but in our demonstration, we will see how to prepare the ZFS Storage Appliance virtual machine and also how to configure the Oracle ZFS appliance from the scratch and to ensure the readiness of the appliance, so that Oracle Grid and RDBMS can be installed.

Ken Jacobs, known to many as Dr. DBA, was a customer advocate, mentor, fearless leader, and one of Oracle's longest-term employees (second only to Larry Ellison himself). Sadly, Ken suffered a pulmonary embolism and passed away at the age of 71. Read more about Ken and the kind words that members of his community had to share about him and his work. Ken Jacobs will be missed by many!

There may be times when it makes sense to consider an open source-based DBMS like Postgres along side your Oracle databases. The session will cover how to migrate from Oracle to Postgres, quickly and without risk, by taking advantage of automated tools to analyze and convert definitions, tables, views, stored procedures and indexes.

Stumped by how to implement least privileges model for your database and reduce your cyberattack surface?  You know it's something you're supposed to do, but how do you know which privileges and roles are needed by all your users and applications?  Too many roles and privileges make it easy for hackers to use a single…

How often do you get the chance to start over and do things the way you want?  That's what we did with Unified Audit in Oracle Database 12c.  Join us to review why we created this greaet new feature, learn about some of the many things you can do with Unified Audit, and hear our…

Recent Oracle Database releases include significant new features that streamline user administration, reduce database attack surfaces, and protect personally identifiable information, and other sensitive data. In this session learn about the new way to authenticate and authorize database users in Active Directory. Explore review recent security innovations including privilege analysis, database vault simulation mode, data…

Data security is critical for a business. Data is not just providing the business processes, workflows and intelligence but are the assets for the company. Protection of the data in databases and in-transit is important if on-premise or in the cloud. They might even been traveling between the two. The skill is mitigating the risk…

Database security starts with a baseline and some basics in configuration. Planning security with database creation and a place to start is important when either starting to work with the databases or starting with security. Practical first steps along with a configuration baseline will be take aways from this session.

This session will provide a blue print for customers to achieve Maximum Availability using  using Oracle RAC and Data Guard. We will go over the internals of the Architectures involved along with recommendations on each layer so Customers can attain maximum availabiliity.

MySQL 8 is now available and is the most recent update to the MySQL database.  It is packed with updates and changes in this presentation we will take at look at those updates and changes.  We will also explore the new features of MySQL 8 as well as well as what has been deprecated and…