This is the 158th edition of Log Buffer, the weekly review of database blogs.
Welcome to the 156th edition of Log Buffer, the weekly review of database blogs.
What we are looking at during this videocast is how to troubleshoot the connectivity issues that can be caused by VIP’s in Oracle RAC environment and how to diagnose cryptic Oracle error messages using SQL*Net tracing facility on the client side.
Oracle’s post-upgrade network ACL setup documentation is much more confusing than it needs to be, at least for simple minds like me. A colleague stepped forward with a simple set of commands for a basic setup that even the tired and stressed can understand. I’ll share that here, with some basic explanation.
This is the 155th edition of Log Buffer, the weekly review of database blogs.
Welcome to the 154th edition of Log Buffer, the weekly review of database blogs. Let’s dive right in, shall we?
I’ll be in Canberra next week presenting at the ACT Oracle User Group Developer and DBA Seminar Day on Thursday, 23 July 2009. If you are in Australian capital city, I’d be very much looking forward to see you there! The topic I will be presenting is 11g New Features Out of the Box. I presented it few times already but originally, it’s based on Christo Kutrovsky’s presentation from Oracle Open World 2007. Unlike many presentations on 11g new features, this session will be focused on the enhancements that often go unnoticed and not marketed widely but boost DBA productivity and are available out of the box without much implementations efforts.
The topic for this meetup is quite exciting – Oracle Exadata and everything about it. David Centellas, Senior Database Consultant from Oracle will do technical presentation on Exadata and, after the break, we will have a open forum discussion where two Oracle’s Enterprise Architects, Tim Rubin and Chris Jones, will answer our questions and share thir real-world experience.
This blog post was inspired by a recent report of a Database Analyst at American Express stealing Credit Card data. It’s amazing how many companies still follow a mainly “perimeter security” approach when it comes to controlling access to sensitive information—their focus is on network security using firewalls, advanced authentication options, and so on. Even with such measures, it’s very common to setup strong barriers to the outside world but very little by way of internal limits; most internal people have some level of access to servers that store and process sensitive data.
This is the 153rd edition of Log Buffer, the weekly review of database blogs.