What is User Experience Monitoring and What is Not? – Oracle Global IT implementation of Enterprise Manager 12c and RUEI
Wednesday, July 18, 2012 12:00 PM - 1:00 PM CDT
Presented by: Eric Tran Le, VP Product Management in the Enterprise Manager team, Oracle
Terms such as Real User Experience Monitoring, Application Performance and Availability have different meanings to Business and IT. As a result you rarely see an end-to-end “Order-to-Cash” SLA contributing to the growing frustration of business user towards IT. Through a specific Oracle internal use case, we will perform a “walk-through” of the process to implement a “real-user experience” service level definition leveraging Oracle EM12c and RUEI as well as ITIL v3 best practices.
Virtualization for the Database Administrator
Thursday, July 26, 2012 12:00 PM - 1:00 PM CDT
Presented by: Eric Jenkinson, Pythian
More and more companies are utilizing virtualization in their environments to lower costs and effectively utilize resources. Placing Oracle databases in virtualized environments is not just for development and testing anymore. The rise of virtualization is introducing new performance challenges to the Oracle DBA that are not well documented at this time. These issues are further complicated by the lack of knowledge of the virtualized configuration by the Oracle DBA. This presentation will bring the Oracle DBA up to speed on the architecture of VMWare and Oracle VM that impact Oracle Database performance. The presentation will also show new tools and procedures for the Oracle DBA, which can be added to their toolbox to help them better address performance issues in a virtualized environment. It is not the intent of this presentation to make the case for virtualization, its intent is to help the Oracle DBA identify and troubleshoot performance problems in a virtualized environment.
Getting Privilege Access Management Right
Friday, August 10, 2012 12:00 PM - 1:00 PM CDT
Keeping data and applications secure is not just about network security. According to Verizon Wireless 2010 Data Breach Investigations Report, 48% of all security breaches are caused by insiders. So, 48% of security breaches were a result of either excessive access or abused access from privileged users and are actually avoidable. Privilege accounts are the keys to the kingdom. Join this webcast to learn how to put effective controls on privilege access management to enforce security without compromising the pace of business.
Shed Some Light on the Bumps in the Night with Enterprise Manager 12c
Wednesday, August 22, 2012 12:00 PM - 1:00 PM CDT
Presented by: David Start
With public and private clouds becoming a reality, new VM servers are spinning up in minutes, and databases are being self-provisioned while your empire is growing rapidly. You can lay back in bed pleased with all that you have built... then the fear starts to creep in. Did you remember to add the new databases to your monitoring? What databases are out there now that you didn't create yourself? Are they following your standards? Are they being backed up? These questions start racing through your mind, along with many others. You hear a pager going off or worse yet, it’s not. Your dream of the great database environment is quickly becoming your worst nightmare. Why not get some control over those nightmares with Enterprise Manager 12c. In this presentation we will look at ways to use Enterprise Manager 12c's monitoring, auditing, and alerting to help alleviate some of the fears keeping you up at night.