Blog: Oracle (2)

-->

Latest Posts

ExaCC Optimization: How Smart Organizations Accelerate ROI

Imagine spending six figures on a high-performance sports car — capable of hitting 300 km/h, packed with cutting-edge tech — only to take it out once a month to drive to the..

Read More

Performance issue : Handling SQL Version Count Issues with High-Volume Kafka Inserts on ExaCS

Introduction We are in the era of AI, where increasing processing power is crucial for handling growing and complex workloads. As enterprise systems continue to scale, database..

Read More

Reducing Cost and Risk: Migrating MongoDB to Oracle Autonomous with Eclipsys

Introduction  If your board is asking why database run‑rate costs keep climbing faster than revenue, look first at the ever‑growing constellation of MongoDB clusters that sprang..

Read More

Safeguarding Data in the Age of AI: Why Oracle Key Vault Multi Master Matters

Introduction In today’s data-driven and AI-accelerated world, data security risks are growing faster than ever. As artificial intelligence continues to evolve, so do the..

Read More

Set Up Oracle ASM on an Azure Linux Virtual Machine: Challenges I Encountered and Their Solutions

Setting up an Oracle ASM-based database on an Azure Linux virtual machine can come with some challenges. While Microsoft provides a comprehensive official guide (Set Up Oracle ASM..

Read More

Managed Services That Prevent Downtime

I have been the Managed Services Team Lead at DSP-Eclipsys for over three years. Today, I would like to share my journey, as well as my roles and responsibilities in this position.

Read More

Protecting Your Encryption Keys: Lessons from the Oracle Cloud Security Breach (OKV - Part 1 )

Introduction Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over..

Read More

Protecting Your Encryption Keys: (OKV - Part 2)

Introduction The Role of Oracle Key Vault in Securing Encryption Keys One of the fundamental aspects of database security is effective key management. A common yet risky practice..

Read More

Oracle Cloud Breach: What CIOs Need to Know — and Do — Right Now

A couple of weeks ago, reports emerged of a cyber threat actor selling what they claim to be 6 million records stolen from Oracle Cloud’s Single Sign-On (SSO) and LDAP systems...

Read More