Search

Top 60 Oracle Blogs

Recent comments

March 2014

Chicago Oracle User Community Restart

Chicago is the third largest city in the United States. There are probably more professional Oracle users here than most other areas in the country – and yet for many years now there hasn’t been a cohesive user group.

But right now there’s an opportunity for change. If the professional community of Chicago Oracle users steps up to the plate.

The Wolves of Midwinter (The Wolf Gift Chronicles)

The Wolves of Midwinter is the second book in The Wolf Gift Chronicles by Anne Rice.

After my enthusiasm for The Wolf Gift, I jumped straight into The Wolves of Midwinter, then kind-of got distracted and took about 3 months to finish it. The long breaks during reading this book made it feel more disjointed than it probably would have done if I had read it in a shorter time frame. The book was divided into several distinct story lines, which in some ways made it easier to take breaks. With the exception of a few scenes of werewolf-on-werewolf love action, which I could have lived without, it was a pretty cool book.

I’m looking forward to the next one!

Cheers

Tim…

Facebook Groups and Lists

For quite some time I’ve had a specific policy on how I use social networks.

ASH Analytics- Activity Focused on Resource Consumption, Part II

This is the second post on ASH Analytics Detail.   You can find the first post here.

ASH Analytics- Activity Focused on SQL Data, Part I

I have a request to hit on some EM performance blog posts, so we’re going to start with breaking down some of the ASH Analytics areas.  ASH Analytics is not your grandfather’s “Top Activity” and I recommend everyone begin to embrace it as it is the the future of performance activity in the Enterprise Manager.  The idea that we will be able to pull directly from ASH and AWR to present our performance dat

Health Care Crises in Application Development

if someone fraudulently uses your information for medical services or drugs, you could be held liable for the costs

The demand for healthcare application development is exploding and has been exploding over the past couple of years because of

Golden rules of RAC performance diagnostics

After collaborating with many performance engineers in a RAC database, I have come to realize that there are common pattern among the (mis)diagnosis. This blog about discussing those issues. I talked about this in Hotsos 2014 conference also.

Golden rules

Here are the golden rules of RAC performance diagnostics. These rules may not apply general RAC configuration issues though.

  1. Beware of top event tunnel vision
  2. Eliminate infrastructure as an issue
  3. Identify problem-inducing instance
  4. Review send-side metrics also
  5. Use histograms, not just averages

Looks like, this may be better read as a document. So, please use the pdf files of the presentation and a paper. Presentation slide #10 shows indepth coverage on gc buffer busy* wait events. I will try to blog about that slide later (hopefully).

IOUG Collaborate 2014 and EM12c Odyssey

Collaborate is coming up fast and this year is going to be a great conference for all involved.  I’ll have a number of sessions, both for those attending in person and those taking advantage of the virtual content.

RLS bug

RLS – row level security, aka VPD (virtual private database) or FGAC (fine grained access control) has a critical bug in 11g. The bug is unpublished, but gets mentioned in various other documents, so can be identified as: Bug: 7828323 “SYS_CONTEXTS RETURNS WRONG VALUE WITH SHARED_CONTEXT_SENSITIVE”

The title tells you nearly everything you need to know – if you’ve declared a security policy as context_sensitive or shared_context_sensitive then a change to the context ought to result in the associated predicate function being called to generate a new security predicate the next time the policy becomes relevant. Thanks to bug 7828323 this doesn’t always happen – so queries can return the wrong set of results.