In my previous post I shared cursor’s role in SQL execution, and how cursors sharing is useful in case of bind variables. My this can…
In this post will share the steps to add nodes in RAC database deployed in Exadata machine. Environment Details: Total no. of nodes in the…
A cursor is a pointer used to fetch rows from a result set. One can think of a cursor as a data structure that describes…
TDE transparently encrypts data at rest in Oracle Databases. It stops unauthorized attempts from the operating system to access database data stored in files, without…
In this post will share the steps to add space on local mount point of Exadata DB server nodes using logical volumes. I will use…
Previously we discussed how to take encrypted backups in SQL server, in this post will continue the encryption topic and implement Transparent Data Encryption (TDE)…
User registered ORA-00054 (Object Lock) issue while dropping a table. I checked the object lock on database and session details using that object. select c.owner,…
Alibaba cloud is one of the top cloud service provider in the world right now. They provide many cloud services in IaaS, Paas, SaaS, etc.…
When the order of pages in a index does not match the physical order in a datafile, we consider it as fragmentation. This happens in…
Dynamic data masking or DDM was first introduced in SQL Server 2016, which limits sensitive data exposure by masking it to non-privileged users. It is…