Blogs
Submitted by John Watson on Sat, 2016-03-05 06:04
DB Time is the time spent by the database server executing user calls. What is this composed of? CPU time, waiting time, and IO time.
Submitted by jesuisantony on Sun, 2016-02-28 02:09
Hi All,
I would like to share something about ORACLE_SID registry parameter.
I had a chance to restore (RMAN) a database on a new Windows server. The restoration/recovery was completed and there was no issue in logging to the database from the server.
The only thing I had to do was to set the ORACLE_SID variable everytime using the statement "set ORACLE_SID=abcd". I will encounter the error "ORA-12560: TNS:protocol adapter error".
Submitted by John Watson on Sat, 2015-10-10 06:01
Proxy authentication has been around since release 9i, but it isn't widely used. It can be a very useful facility for giving certain users access to high privileges without having to give them any direct grants or roles, and avoids many of the problems of using shared accounts. It is of course fully audited.
Submitted by John Watson on Mon, 2015-09-07 10:46
Standard Edition release 12.1.0.2 is now available. Download it from the usual locations. But along with the great news, comes some news that is not so great: the licensing model has changed.
Submitted by John Watson on Sat, 2015-07-25 10:00
Following previous blog re BASIC compression, here are a couple of simple tests with Advanced Compression - which is supposed to survive conventional DML.
Submitted by John Watson on Thu, 2015-07-09 11:59
BASIC table compression is included with Enterprise edition, and can achieve respectable compression ratios. But beware! Subsequent DML may be disastrous.
Submitted by sramawat on Thu, 2015-06-18 02:12
This paper provides best practices for rapid deployment of Oracle Database Vault protections to
secure sensitive application data inside the database. Oracle Database Vault enables you to restrict administrative access to an Oracle
database. This helps you address the most difficult security problems remaining
today: protecting against insider threats, meeting regulatory compliance
requirements, and enforcing separation of duty. It covers the following main topics:
Submitted by John Watson on Sat, 2015-04-25 13:56
The ability to quiesce the database was introduced in release 9, but to this day I find that many people are not aware of it. It can be really useful - so let's describe it. I'll begin by positioning the quiesce capability: when is it useful. Then detail how to do it, then reverse engineer the mechanism.
Submitted by John Watson on Wed, 2015-04-08 11:50
Excellent book - I've just posted this review on Amazon:
Submitted by MarcMartens on Tue, 2015-02-24 06:41
Why publishing this under SQL instead of RDBMS Server?
The necessaty to create supporting indexes for foreign keys has been explained in other articles.
However writing a foolproof query to identify missing FK indexes is not so straightforward as it might look. I used to do it PLSQL, but this has proven not to scale very well and taking quite some elapsed time and system resources in databases with many thousands of tables. The blog entry is about the challenge to get the job done with a well performing SQL statement.
Pages
|