Editors' Picks
-
Managing Oracle connections from third-party apps
Oracle expert Brian Peasland answers one reader's question about common pitfalls when connecting Oracle to outside programs.23 Jul 2013
-
Making the case for virtualizing business-critical applications
Virtualizing business-critical applications like Oracle Database will reduce risk and effort. Here's how to win converts to database virtualization.03 Jun 2013
-
The basics of Oracle database availability
Database expert Jeff McCormick introduces some basic Oracle database availability concepts such as uptime and mean time between failures.25 Apr 2013
-
How to tune Oracle instance recovery
Find out how to tune Oracle instance recovery in this tip from Matthew Morris, a renowned Oracle Database author.19 Apr 2013
-
Perfect the Oracle RMAN duplicate 10g command
One reader asks expert Brian Peasland a question about datafile sizes with the Oracle RMAN duplicate 10g command.22 Feb 2013
-
Oracle Day: A mix of Oracle career day, field trip and pep rally
Is going to Oracle Day worth the trip? If you're going for Oracle career networking, yes. But is the information useful?13 Nov 2012
-
Where to look for Oracle DBA learning materials
Readers ask SearchOracle.com expert Brian Peasland where they can find learning materials for becoming a better Oracle database administrator.13 Aug 2012
-
Where to look for Oracle DBA learning materials
Readers ask SearchOracle.com expert Brian Peasland where they can find learning materials for becoming a better Oracle database administrator.13 Aug 2012
-
Black Hat 2012: David Litchfield slams Oracle database indexing
At Black Hat 2012, longtime Oracle thorn David Litchfield presents working exploits targeting Oracle database indexing vulnerabilities.26 Jul 2012
-
Oracle faltered in pulling Itanium support, says analyst
IT analyst Rob Enderle says that Oracle made a mistake in pulling support away from approximately 140,000 Oracle on Itanium customers, adding that right now “Oracle on Itanium is probably not a goo...29 Jun 2012
-
Retail developer builds Oracle business intelligence on JD Edwards
Retail development company Benderson Development used a “build and buy” approach to creating its Oracle business intelligence platform on top of JD Edwards.26 Apr 2012
-
Oracle vs. SQL Server faceoff: Oracle Database wins on high availability security
An Oracle user group member argues that Oracle wins in the battle of Oracle vs. SQL Server.04 Apr 2012
More Like This
-
Perfect the Oracle RMAN duplicate 10g command
One reader asks expert Brian Peasland a question about datafile sizes with the Oracle RMAN duplicate 10g command.22 Feb 2013
-
Mitigations for an Oracle database authentication vulnerability
A patch for an Oracle database authentication vulnerability was only released for version 12. Expert Nick Lewis discusses mitigations for 11.1 users.20 Feb 2013
-
The 2013 OWASP Top 10 list: What's changed and how to respond
Expert Michael Cobb highlights the changes made in the 2013 OWASP Top 10 list, including new vulnerabilities and what they mean for enterprises.10 Sep 2013
-
Oracle 10g tops list of Oracle database platforms
In a survey taken in 2010, Oracle professionals listed Oracle Database 10g as their primary database platform, despite 11g having been out since 2007.18 Nov 2010
-
NPulse adds full indexing to 10g packet capture appliance
Retrieve sessions fast with nPulse CPX's full indexing of 10 Gbps packet capture, which indexes 30 million packets per second.14 Aug 2013
-
Quiz: Database security issues
This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson.30 May 2013
-
Understanding database security issues
This presentation takes a look at vulnerabilities that directly affect database security and what enterprises should do to monitor database access to detect potential security incidents.30 May 2013
-
Database security issues
The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monit...30 May 2013
Security Management Strategies for the CIO