Recent Blogs I’ve Read:
1. How Can a Data Breach of an Oracle Database be Managed and Analysed?
Pete Finnigan asks, “If you become the latest victim of a data hack and your Oracle database is compromised then what do you do?”
Y V Ravi Kumar explores the patches for Oracle 19c with Physical Standby Databases.
3. Oracle 23ai – Unleashing the Power using vector search
Adityanath Dewoolkar shares the following video:
4. How to create oracle 19c database using dbca silent mode?
Anurag Pandey shares how to create Oracle 19c database on silent mode.
Paul Lewis shares the power of 3: Pythian, Oracle and Google Cloud…
He concludes his blog with:
“Pythian, Oracle, and Google Cloud have partnered to help companies modernize their Oracle environments in the cloud. This collaboration combines Oracle’s database capabilities, Google’s cloud services, and Pythian’s migration expertise to offer enterprises a practical path for moving critical workloads to the cloud while unlocking opportunities for innovation and growth.”
6. Exploring how SaaS Cloud Security performs penetration testing
David B Cross introduces guest author Robbie Rader.
7. Fundamental Security Part Nine – Scripted Passwords
Neil Chandler asks,
“How many of you have scripts on your database server or elsewhere like this?”
sqlplus system/manager <<EOF SELECT info FROM table; EOF
8. Fireworks AI boosts AI model efficiency and performance with OCI AI Infrastructure
Lin Qiao says, “The combination of AI infrastructure with high-speed networking, as well as very proactive support, has been key for me. Oracle understands my needs and considers my success as their success.”
9. UPDATE SET ROW – Convenience Might Be Costly
Connor McDonald begins by writing, “A cool feature in PL/SQL is the ability to perform common DML operations without needing to reference the individual columns of a table. The ability to do a “SELECT *” into a ROWTYPE variable dates as far back as Oracle 7, but the benefits of that were limited because the moment the needed to issue an UPDATE or INSERT with that variable you were back to referencing each of the columns.”
This blog starts with, “At the time of writing this blog post , this security weakness exists in all supported versions of EnterpriseDB Postgres Advanced Server (EPAS) 16,15,14,13.”