Oracle

Setting up Network ACLs in Oracle 11g… For Dummies

Oracle’s post-upgrade network ACL setup documentation is much more confusing than it needs to be, at least for simple minds like me. A colleague stepped forward with a simple set of commands for a basic setup that even the tired and stressed can understand. I’ll share that here, with some basic explanation.

Alex Gorbachev at ACTOUG Developer and DBA Seminar Day

I’ll be in Canberra next week presenting at the ACT Oracle User Group Developer and DBA Seminar Day on Thursday, 23 July 2009. If you are in Australian capital city, I’d be very much looking forward to see you there! The topic I will be presenting is 11g New Features Out of the Box. I presented it few times already but originally, it’s based on Christo Kutrovsky’s presentation from Oracle Open World 2007. Unlike many presentations on 11g new features, this session will be focused on the enhancements that often go unnoticed and not marketed widely but boost DBA productivity and are available out of the box without much implementations efforts.

Sydney Oracle Meetup #8 — Exadata Extravaganza

The topic for this meetup is quite exciting – Oracle Exadata and everything about it. David Centellas, Senior Database Consultant from Oracle will do technical presentation on Exadata and, after the break, we will have a open forum discussion where two Oracle’s Enterprise Architects, Tim Rubin and Chris Jones, will answer our questions and share thir real-world experience.

Database Analyst Steals Credit Card Data

This blog post was inspired by a recent report of a Database Analyst at American Express stealing Credit Card data. It’s amazing how many companies still follow a mainly “perimeter security” approach when it comes to controlling access to sensitive information—their focus is on network security using firewalls, advanced authentication options, and so on. Even with such measures, it’s very common to setup strong barriers to the outside world but very little by way of internal limits; most internal people have some level of access to servers that store and process sensitive data.

Page 80 of 140« First Page...10...7879808182...90...Last Page »