OCI


  • SQLcl: Customizing on a Mac

    SQLcl: Customizing on a Mac

    In this post I will summarize the steps I’ve taken to customize SQLcl on my Mac working environment. We assume that the reader is familiar with the procedures outline din my previous post on SQLcl on setting up SQLcl on Mac environment. Terminal customization First I start with changing the terminal a bit in order…


  • SQLcl: Setup on a Mac

    SQLcl: Setup on a Mac

    Simple and straightforward steps about how to setup Oracle’s new SQL command line tool on a macOS X environment. Download Application and Environment Setup Attempt to start the application: Setup Java Download Java from the Oracle site. As I am on a mac wit M processor (ARM) , I cannot install jre-8u371-macosx-x64.dmg, so I cannot…


  • Linux Playground on #OCI

    Linux Playground on #OCI

    Spring is here and I will definitely spend more time outside on my bike and carrying my iPad in my backpack. So I was looking for an easy to setup environment to practice and train my shell scripting skills. And Oracle Always Free has a simple solution for that! I setup a small compute instance…


  • Three Ways to Use Backups for Disaster Recovery across Regions in Oracle Cloud

    Introduction Oracle Data Guard provides zero or near zero data loss and a recovery time of just a few minutes. For unrecoverable failure, a restore … Three Ways to Use Backups for Disaster Recovery across Regions in Oracle Cloud


  • Is Oracle Autonomous Database the answer to the many database security issues? (II)

    Is Oracle Autonomous Database the answer to the many database security issues? (II)

    In the previous article, I discussed the main differentiating capabilities of the Autonomous, what makes it special on the market. In this post, I will discuss how are those capabilities implemented.


  • Is Oracle Autonomous Database the answer to the many database security issues? (I)

    Is Oracle Autonomous Database the answer to the many database security issues? (I)

    There is no surprise that typical Database setups are the main target of the hacking attacks worldwide. The reason is obvious: cracking a database will result in access to the data which is the main ‘merchandise’ to be shared or sold on the dark corners of the World Wide Web.