Thursday, August 13, 2020
dbametrix
More
    Home Oracle DBA Tips

    Oracle DBA Tips

    Solutions Associated With Oracle Backup and Recovery

    Some basic ideas about Oracle backup and recovery planning as per business requirement.

    Compression in Datapump of Oracle 11g

    New feature - compression in datapump in Oracle 11g detailing and usages.

    Background Processing in Unix

    This blog post provides brief idea about background processes in Unix/Linux operating systems

    Oracle 10g New Features

    This blog post about Top 10 Oracle 10g new features

    select for update

    This blog post provides some detail about select for update in Oracle

    EMCTL Oracle Enterprise Manager Control Utility

    Emctl very useful command reference for managing Oracle Enterprise Manager Grid.

    Oracle 11g new security feature for authentication restriction

    Oracle 11g new security feature called Authentication Attempts Restriction Oracle tool

    Database character set conversion pre-checks Oracle utility

    Detailing about Pre-checks Oracle utility about database character set conversion for upgrade or migration.

    ORA-01045: user SCOTT lacks CREATE SESSION privilege

    Detail explanation about solution of ORA-01045 error and root cause detailing

    Delete archives using RMAN in Oracle

    Article explains how to delete archives using recovery manager in Oracle

    Copy user using DBMS_METADATA

    Hi friends, How to copy one user to make another user same as without any objects. In another words we can say that how to...
    - Advertisment -
    dbametrix

    Most Read

    nosql Security Vulnerabilities

    Article explain in detail of NoSQL database security challenges and how to find out Vulnerabilities.

    SQL vs noSQL Which is better

    Blog post explains basic differences of sql and nosql and when it is better to use nosql for getting best performance and security.

    Performance of noSQL Database

    The article shows reasons of performance of nosql downgrading or not.

    What is Computer security

    The article explains about what are the kinds of computer security vulnerability and how to protect and find out most common vulnerabilities risks.