Chanaka Yapa

-->

Latest Posts

Exadata Tips: Reduce Storage, Improve Performance with Compression

We live in an era where businesses are powered by data, running their most critical systems on robust platforms such as Oracle Exadata Cloud@Customer and Oracle Exadata Cloud..

Read More

Leveraging Oracle TAC and Rolling Patching in the AI-Driven Era

Introduction We live in an era where businesses are powered by data, running their most critical systems on robust platforms such as Oracle Exadata Cloud@Customer and Oracle..

Read More

How to create Linux Local Repository using ISO Image

Create a local repository using iso image to installation Oracle RPM. This blog will cover the local repository creation using iso image. Most environment customers are not..

Read More

My Focus at Oracle AI World 2025 – AI, Security, and the Road Ahead

Navigating the Future of AI and Security at Oracle AI World 2025 As we step into the age of intelligent enterprises, AI and data security have become inseparable pillars of..

Read More

Optimizer Regression After Upgrade? Fix Slow Queries Using DBMS_SQLDIAG.CREATE_SQL_PATCH

Introduction We are in the era of AI, where increasing processing power is critical to managing rapidly growing and complex workloads. As enterprise systems continue to scale,..

Read More

Performance issue : Handling SQL Version Count Issues with High-Volume Kafka Inserts on ExaCS

Introduction We are in the era of AI, where increasing processing power is crucial for handling growing and complex workloads. As enterprise systems continue to scale, database..

Read More

EXACS Standby - ORA-12154: TNS (Disable RFS Client)

Introduction In today’s data-driven world, safeguarding data is crucial. Organizations must be equipped to handle potential failures by implementing strong disaster recovery (DR)..

Read More

Safeguarding Data in the Age of AI: Why Oracle Key Vault Multi Master Matters

Introduction In today’s data-driven and AI-accelerated world, data security risks are growing faster than ever. As artificial intelligence continues to evolve, so do the..

Read More

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More