Chanaka Yapa
-->Latest Posts
Simplifying Lower Environment Refreshes with Oracle Exadata Cloud as Service (ExaCS)
Introduction AI technologies are evolving at a rapid pace, but the landscape is still unstable. At the core of every AI system lies data, and validating AI models without proper..
My Focus at Oracle AI World 2025 – AI, Security, and the Road Ahead
Intro Navigating the Future of AI and Security at Oracle AI World 2025 As we step into the age of intelligent enterprises, AI and data security have become inseparable pillars of..
Optimizer Regression After Upgrade? Fix Slow Queries Using DBMS_SQLDIAG.CREATE_SQL_PATCH
Introduction We are in the era of AI, where increasing processing power is critical to managing rapidly growing and complex workloads. As enterprise systems continue to scale,..
Performance issue : Handling SQL Version Count Issues with High-Volume Kafka Inserts on ExaCS
Introduction We are in the era of AI, where increasing processing power is crucial for handling growing and complex workloads. As enterprise systems continue to scale, database..
OLVM : Expanding Fiber Channel (FC) Support in OLVM Using a Data Domain Storage System
Introduction We are living in a data-driven era where AI is advancing rapidly, placing even greater demands on processing power and virtualized environments. While cloud adoption..
Streamlining TDE Key Management with Oracle Key Vault and Secure Endpoint Deployment
One of the core pillars of database security is robust encryption key management. Yet many organizations still store Transparent Data Encryption (TDE) keys locally, a practice..
EXACS Standby - ORA-12154: TNS (Disable RFS Client)
Introduction In today’s data-driven world, safeguarding data is crucial. Organizations must be equipped to handle potential failures by implementing strong disaster recovery (DR)..
Safeguarding Data in the Age of AI: Why Oracle Key Vault Multi Master Matters
Introduction In today’s data-driven and AI-accelerated world, data security risks are growing faster than ever. As artificial intelligence continues to evolve, so do the..
Protecting Your Encryption Keys: (OKV - Part 2)
Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..
Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )
Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..
Popular Post





