Tag: IOUG

Data security is critical for a business. Data is not just providing the business processes, workflows and intelligence but are the assets for the company. Protection of the data in databases and in-transit is important if on-premise or in the cloud. They might even been traveling between the two. The skill is mitigating the risk…

Get hands-on and learn the features of the Python cx_Oracle interface for Oracle Database. In this session learn efficient techniques for connection management, statement handling, and more. If you want to use Python and Oracle Database, this session is for you. Basic programming skills in any language are required

What does “autonomous” really mean, and what makes the database autonomous? If you’re looking for an answer to this question, this session is for you. In this session, we’ll cover the many benefits of autonomous capabilities and invite you to take a peek under the hood for a deep dive into the machine learning algorithms…

The most interesting new feature Oracle 18c introduces to Developers are Polymorphic Table Functions and Qualified Expressions. Polymorphic Table Functions finally allow the Developer to define the structure of the returned records at runtime. Qualified Expressions allows defining array- or record constructors that assign all values in a single statement. What looks at first sight…

One of the most critical aspects of building effective systems is the successful management of unstructured/semi-structured information. The database is no longer only a place to store dollars and cents for the purposes of accounting. Efficient manipulation of JSON has become one of the most critical elements of contemporary database infrastructure.

Even though you can store JSON documents in VARCHAR2 columns, in reality you will quickly outgrow VARCHAR2 size limitations and will have to switch to CLOBs for storage. However, few people in the development community really understand the underlying mechanics of Oracle LOB datatypes and consider it yet another DBA issue! This presentation attempt to fill that knowledge gap:

Core conceptual elements of how Oracle works with LOBs (multi-segment storage, IO mechanism, copy semantics/pointer semantics, etc.)
SecureFiles/BasicFiles implementation issues
Best practices of LOB manipulation (both generic and JSON-related)

Overall, this presentation gives database developers sufficient knowledge to be able to build efficient modern applications. Real-life examples will be included to pinpoint key ideas and solutions.

Setting up an Oracle Analytics Cloud (OAC) instance can be a little tricky. Learn the ins and outs of this fairly new Oracle offering in this session. Topics covered will be OAC parts and pieces, how to navigate in the Cloud environment, creating the database and OAC instance, building out an application and analysis and…

Learn from Oracle GoldenGate Product Management on the new GoldenGate 18c features, including a deeper dive into the new Microservices Architecture for automing Oracle GoldenGate.  And discuss enhancements related to Active-Active replication including the new Automatic Conflict Detection and Resolution features.

MySQL 8 is now available and is the most recent update to the MySQL database.  It is packed with updates and changes in this presentation we will take at look at those updates and changes.  We will also explore the new features of MySQL 8 as well as well as what has been deprecated and…

New DBA's hear stories from their experienced peers about databases being recovered from certain failure and the heroics involved, but what's the reason for those successes? One of the main tools, used by the savior DBA, is the Recovery Manager: RMAN. We're entrusted with our customer's data and the novice DBA has to know how…

The Oracle Database Security Assessment tool offers the databsase administrtor the ability to check their database environments to understand the risks that exist to their environment.  Knowning where the environment is not following security best practices, where there are open known security risks is the first step is closing those risks and hardening the environment. …