Blog Archives

Get on the Express, Enterprise Manager Database Express That Is

Oracle has removed previous versions of the Database Console and replaced it with Enterprise Manager Express (aka. EM Express). This is a much smaller and lightweight program, it is easy to use and configure, and provides the basics of what is expected from an Enterprise Manager such as database configuration and administration, space administration, users and roles management, and performance management.

Read more ›

Licensing Oracle in Windows Azure

Microsoft and Oracle have an enterprise partnership that will allow their customers to run Oracle software on Windows Server Hyper-V and in Windows Azure. Customers will be able to deploy Oracle software — including Java, Oracle Database and Oracle WebLogic Server — on Windows Server Hyper-V or in Windows Azure and receive full support from Oracle. This essentially makes the Windows Azure platform the equivalent of Amazon’s Elastic Compute Cloud or the EC2 environment and it makes Azure an alternative to the EC2 environment.

Read more ›

What is Oracle Partitioning Option and why would I need it when I already own Oracle Database Enterprise Edition?

Oracle Partitioning Option is a separately licensed option of Oracle Database that is only available with the Enterprise Edition of Oracle Database. The Partitioning option for Oracle Database 11g offers the widest array of partitioning methods available, including interval, reference, list, and range.

Read more ›

Licensing the Internet of Things

The “Internet of Things” – eventually to be followed by the “Internet of Everything” – brings about the potential for enterprise software to be used by a vast new array of access points. With this comes licensing challenges and expense

Read more ›

Enact and Redact: Data Redaction feature of Oracle Advanced Security Enterprise Option in 12c

With today’s growing concerns regarding the security on BYO devices (BYOD) such as smartphones, tablets, and laptops; it is critical to ensure sensitive data is not exposed. Enacting security policies and procedures that help remove or reduce these concerns is

Read more ›