It's no surprise that the concept of a proxy has made its way into the database arena. The MySQL Proxy sits between your application and your MySQL database. Future articles will discuss the myriad of uses for this technology.
Jim Czuprynski demonstrates how to install and configure a new Oracle Database 11g Release 2 (11gR2) Grid Infrastructure home as the basis for the majority of the grid computing features that were only available in a Real Application Clusters (RAC) clustered database environment in previous releases.
While not that technical in nature, this one question gives you an opportunity to list reasons or possibilities of a technical nature, which in turn allow you to demonstrate your knowledge and understanding of how Oracle Database works, and perhaps in this case, how it may not be working.
Ignore your archive logging function and your Oracle database will soon become crippled and unusable. Learn how to pay attention, starting with ensuring that Automatic archival is Enabled, how to switch into archive log mode if it's not enabled and how to locate where redo logs are archived.
Discover what happens within SQL Server during and after configuring Oracle as a data source. Quite a few objects are created, including a system-level database, numerous jobs running under the SQL Server agent, and flat files created on the file system. Read on to learn more.
Oracle Data Guard still offers support for the venerable logical standby database in Oracle Database 11g. This article, investigates how data warehouse and data mart environments can effectively leverage logical standby database features, but simultaneously provide a final destination when failover from a primary database is mandated during disaster recovery.
In previous articles discussing Oracle and VMware, the hardware and software components consisted of a Windows-based PC and the Oracle RDBMS. Steve Callan expands upon the "Oracle in a virtualized environment" concept by looking at other alternatives for the hardware and software.
Oracle focuses on the default settings for just about all of the security setup in "The Oracle 2-Day Security Guide". As we draw near the close of the book, we'll examine a few guidelines for auditing.
The requirements for setting up Oracle as a data source for SQL Server include some obstacles and one major showstopper. Read on to learn a work-a-round that allows you to continue the setup.
Turning on auditing is easy; knowing what to do with it is entirely different. Learn how to create a standard audit trail using Oracle’s Enterprise Manager.
If you don’t know where to start when setting Oracle auditing parameters, just start with what Oracle recommends. In this article, we set the default auditing as recommended by Oracle.
This article takes a quick look at Oracle database's materialized view and extends the concept of that feature to a case where Oracle is the data source for another relational database management system.
Many database shops have no idea of the security breaches that occur across user granted privilege and floating unused synonyms. James Koopmann offers tips for granting privileges explicitly to a user or group of users, and assigning privileges to a role and then granting that role to users.
What is the best way to prevent unintended updates or deletes in a table? The small changes may not be so hard to recover from, but what if every record in the table underwent a change? How can you protect users from themselves and how do you protect yourself from you?
Many security breaches occur across user granted privileges and floating unused synonyms. That being said, the question becomes, how can we get a handle on this. Read on to learn more...
Using profiles for password management is an effective way to restrict unsolicited database usage. Every DBA should verify the password restrictions and setup an appropriate number of profiles for the groups or types of users within the database.
This article - the sixth in this ongoing series - explores how to manually fail over a production database to its corresponding physical standby database, as well as reinstate a "failed" primary database to a physical standby.
In a prior article on Oracle's Block Browser and Editor tool (BBED), the installation of the tool was covered. In this article, we'll look at starting a session using a simple database and see how to view data.
Any activity that may impact a statement's execution plan is a candidate for using SPA to investigate the possible consequences - both good and bad. Steve Callan discusses the workflow and provides a working example.