One of the most common questions our clients ask us is, "can we save money migrating to an open-source database like PostgreSQL or MongoDB?" The answer is simple: yes. Before we dive into the details, it's important to note that "open source" does not mean free. While...
Welcome to our blog, which is more than just a record of our experiences. It’s a resource.
Our blog is an invaluable resource for anyone struggling with the challenges of managing a database, applications, or clouds.
We understand the difficulties involved in troubleshooting, building, improving, securing, and operating these platforms,
and we’re here to share our insights and expertise with you. Browse through our collection of blog posts below,
and don’t hesitate to leave your comments and feedback.
How to Tell If Your Computer Has a Virus and Steps to Remove
Overview This doc is a general overview of symptoms to look for in the event of a potential virus alert from your service support product, or a user calls in regarding a potential virus. We'll also cover what to do in the event of a potential virus on a PC. We are...
Converting Oracle 12c Non-CDB Database to CDB Multitenant Architecture
The steps below outline how to convert an Oracle 12c non-container database to a pluggable database in the multitenant architecture. Oracle has moved all future releases to the multitenant architecture so conversion will eventually be necessary. These steps are...
Setting up Azure Active Directory Domain Services (Azure AD DS)
Microsoft's Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication that's fully compatible with Windows Server Active...
Resolving the ORA-24247: network access denied by access control list (ACL) error
Before Oracle 11g access to network services was controlled by granting privileges on packages such as UTL_HTTP, UTL_TCP, UTL_SMTP, and UTL_MAIL. After 11.1 Oracle introduced Application Control Lists (ACL) as part of their Application Security and has now added...
Low Disk Space on Server
Overview This document will cover procedures for low disk space alert on OS/C: drives as well as general disk space low alert. Low disk space can have potentially negative consequences with a server. Some examples are: Unable to install critical OS security...
Refreshing a Physical Standby Using Recover from Service on 12c
SUMMARY: Database administrators must roll forward a troubled Oracle 12c Physical Standby database to resolve severe data gaps caused by missing or corrupt archive logs by executing a multi-step RMAN procedure utilizing the automated RECOVER FROM SERVICE command....
What is MFA and Why does it Matter?
Multi-Factor Authentication (MFA) is something a lot of IT professionals know about but never want to bring up to their clients. MFA is the next step defense in your everyday battle in protecting your day to day operations. So let's talk about it. What is MFA?...
Validating VIP Usage
Recently, I was working on a database using HADR with failover handled by TSAMP. The database was configured to use a virtual IP (VIP) address. However, when I tested the failover with the application team, some of the applications were getting SQL1776N errors from...
ORA-00933: SQL command not properly ended
Prior to diving into this error, it's important we discuss how Oracle processes queries logically and in what order. Oracle has a couple of rules as to how it executes each query in a specific processing order. Oracle processes a query as below: Gathers rows based on...









