Skip to content

Chanaka Yapa

-->

Latest Posts

Simplifying Lower Environment Refreshes with Oracle Exadata Cloud as Service (ExaCS)

Introduction AI technologies are evolving at a rapid pace, but the landscape is still unstable. At the core of every AI system lies data, and validating AI models without proper..

Read More

My Focus at Oracle AI World 2025 – AI, Security, and the Road Ahead

Intro Navigating the Future of AI and Security at Oracle AI World 2025 As we step into the age of intelligent enterprises, AI and data security have become inseparable pillars of..

Read More

Optimizer Regression After Upgrade? Fix Slow Queries Using DBMS_SQLDIAG.CREATE_SQL_PATCH

Introduction We are in the era of AI, where increasing processing power is critical to managing rapidly growing and complex workloads. As enterprise systems continue to scale,..

Read More

Performance issue : Handling SQL Version Count Issues with High-Volume Kafka Inserts on ExaCS

Introduction We are in the era of AI, where increasing processing power is crucial for handling growing and complex workloads. As enterprise systems continue to scale, database..

Read More

OLVM : Expanding Fiber Channel (FC) Support in OLVM Using a Data Domain Storage System

Introduction We are living in a data-driven era where AI is advancing rapidly, placing even greater demands on processing power and virtualized environments. While cloud adoption..

Read More

Streamlining TDE Key Management with Oracle Key Vault and Secure Endpoint Deployment

One of the core pillars of database security is robust encryption key management. Yet many organizations still store Transparent Data Encryption (TDE) keys locally, a practice..

Read More

EXACS Standby - ORA-12154: TNS (Disable RFS Client)

Introduction In today’s data-driven world, safeguarding data is crucial. Organizations must be equipped to handle potential failures by implementing strong disaster recovery (DR)..

Read More

Safeguarding Data in the Age of AI: Why Oracle Key Vault Multi Master Matters

Introduction In today’s data-driven and AI-accelerated world, data security risks are growing faster than ever. As artificial intelligence continues to evolve, so do the..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More