martes, 21 de junio de 2016

Learn From Craig At Kscope16 June 26-30

   

Learn From Craig At Kscope16
June 26-30

Kscope16 is less than a week away! We hope you are planning to attend. Craig's sessions are listed below. Add Craig's sessions to your schedule!
Here is his schedule for the conference:
  • Sunday, June 26 - arrives in the afternoon
  • Monday, June 27 - presentation
    • Incident Analysis Using ASH Data
      • Session 6
      • 4:30-5:30pm
  • Tuesday, June 28 - presentation
    • Resolving Cache Buffer Chain Latch Contention
      • Session 7
      • 8:30-9:30am
  • Wednesday, June 29 - departs in the afternoon
  • Location: Sheraton Grand Chicago
    • 301 East North Water St., Chicago, IL 60611
If you would like to meet up with Craig personally, please email him directly to make an appointment - craig@orapub.com. He will be available for job mentoring and free performance consulting every day of the conference. Bring an AWR report for him to study!

It is less than one week away so register for Kscope now!
We look forward to meeting you there.
orapub_logo_v8_FINAL_RGB_horizontal

Oracle Delivers the Power of Engineered Systems to Organizations of All Sizes

Press Release

Oracle’s expanded portfolio of database appliances are now available for enterprise and midmarket organizations, and provide customers with a pathway to the cloud

Redwood Shores Calif—Jun 21, 2016

Today, Oracle announced two new models of its Oracle Database Appliance (ODA) bringing all of the performance and reliability of Oracle's Engineered Systems to small and mid-sized businesses for the first time.

In addition, as organizations seek opportunities to transition to the cloud, Oracle’s new database appliances provide a bridge between on-premise systems and the cloud. In the future, organizations that plan to connect their ODAs to the Oracle Cloud can seamlessly back up their data automatically.

"Bringing in Oracle Database Appliances definitely reduced the complexity of our environment and allowed us to support our 25X data growth over the past few years," said Jacqueline Hufford-Jenson, Senior Manager, Database Administration, LifeLock, a fast-growing, mid-market company.  "Today, using the Oracle Database Appliance straight out of the box, we get significantly reduced latency, which has played a role in helping us grow as a company.”

Oracle’s portfolio of database appliances, like all Oracle Engineered Systems, enables organizations to simplify their journey to the cloud. Customers can backup or archive their critical data, and easily move their workloads to the Oracle Cloud whenever needed. Central to these new versions of the ODA is support for the Oracle Database Standard Edition 2 and Oracle Database Enterprise Edition.

“We’re excited to bring the power, simplicity and capabilities of Oracle’s Engineered Systems in at a price point that allows every organization to save time and money,” said Jim Gargan, senior vice president of Oracle Converged Infrastructure. “With the family of database appliances, Oracle offers built-in expertise for single-instance database and high-availability deployments, while providing a bridge between on-premise systems and the cloud, enabling all of our customers to capitalize on their investment.”

The Oracle Database Appliance is designed to run single-instance databases, database consolidation of multiple databases, and high-availability designs.

Added features include:
  • Starting price of $18,000 for new, entry-level database appliance for single or small database instances;
  • Reducing time to value, customers can deploy in as little as 30 minutes;
  • NVMe Flash drives for ultimate performance and reliability;
  • Integration to Oracle Cloud, allowing businesses to backup and archive their critical data as well as migrate workloads to the cloud when ready.

"Since Oracle owns the entire stack, its systems are fully hardware-software integrated, pre-tested, and optimized from silicon to applications. They are quickly deployed, extend smoothly to Oracle’s cloud, and the various systems seem to work well together. The latest family members, Oracle Database Appliance X6-2S and X6-2M, should help small and medium-sized businesses put a fully operational entry-level Oracle database in place – apparently no screwdrivers required," said Peter Rutten, Analyst, IDC Computing Platforms Group.


lunes, 20 de junio de 2016

Oracle Announces Pfizer’s Selection of Oracle Cloud for Clinical Data Management and Trial Management across its Clinical Trial Portfolio

Press Release
Redwood Shores, Calif.—Jun 20, 2016

Oracle today announced that after a detailed review and selection process, Pfizer has selected Oracle Health Sciences InForm Cloud Service and the Oracle Siebel Clinical Trial Management and Monitoring Cloud Service to help manage and monitor its more than 300 clinical trials a year and continue to provide best-in-class solutions.

“Oracle Health Sciences InForm Cloud Service and Oracle Siebel Clinical Trial Management and Monitoring Cloud Service can simplify how we manage both operational and study data for in-house as well as outsourced studies,” said Rob Goodwin, vice president of Pfizer Global Product Development, Center of Excellence. “Clinical teams will be able to access study data through Oracle’s single platform cloud service, eliminating the need to send data back and forth to CROs, saving us time and reducing the cost of our clinical studies.”

By using Oracle Health Sciences InForm Cloud Service, Pfizer will be able to take advantage of over 100,000 investigator sites already trained in InForm, while increasing site data satisfaction.

The Oracle Health Sciences InForm Cloud Service will enable Pfizer to have greater control over its data and provide measurable efficiency and productivity gains in data management and remote monitoring. In addition, study templates and library management capabilities within Oracle Health Sciences InForm will enable Pfizer to accelerate the study-build process and result in faster trial implementation.

“Today, pharma companies are challenged by increasingly complex global clinical trials,” said Steve Rosenberg, senior vice president and general manager, Oracle Health Sciences. “With more than 15 years of electronic data capture experience in the clinical industry, Oracle Health Sciences helps leading pharmas — such as Pfizer — not only to standardize and optimize their clinical study processes, but also to be prepared with value-based clinical innovation solutions that enable them for the future of data collection.”

Oracle Health Sciences InForm Cloud Service includes both Oracle Health Sciences InForm and Oracle Health Sciences Data Management Workbench (DMW) to advance standardized end-to-end clinical data collection and management processes that help drive greater efficiencies for both internal and outsourced trials. Utilizing the platform, efficiencies can be gained through the seamless integration of Oracle Health Sciences InForm, Oracle Health Sciences Central Designer, and Oracle Health Sciences Data Management Workbench, enabling data standardization, streamlining collection, consolidation, cleaning, and transformation.

Pfizer will also use Oracle Siebel Clinical Trial Management and Monitoring Cloud Service, including Oracle Siebel Clinical Trial Management System, Oracle Health Sciences Clinical Development Analytics, and risk-based monitoring (RBM) functionality to provide new insights into trial management and help increase efficiency of the monitoring workforce. A single set of tools for internal and outsourced trials can simplify data exchange and the interface between investigator sites, CRO partners, and Pfizer. With the selection of Oracle’s platform and RBM solution, Pfizer will be able to execute risk-based monitoring through an integrated approach.

The Oracle Siebel Clinical Trial Management and Monitoring Cloud Service, which utilizes Oracle Siebel Clinical Trial Management System and Oracle Health Sciences Clinical Development Analytics, is a solution that combines standardized comprehensive clinical trial capabilities, integrated analytic tools, and data security with a cloud service that enables organizations to manage clinical trials effectively and economically, as well as improve CRO and sponsor relationships from early to late stage clinical trials.

·         To learn more about Oracle Health Sciences, please connect on Twitter @OracleHealthSci and at facebook.com/oraclehealthsciences. You can also follow our blog Oracle Health Science Blog and find us on LinkedIn.

LIVE EVENT: QA AUTOMATIZADO DE APPS MÓVILES CON DEVICE FARM DE AWS

divider
Evento que se celebrará a la hora y en la fecha y ubicación siguientes:
Jueves, 23 de junio de 2016 desde las 18:30 hasta las 21:00 (Hora estándar central Hora de Costa Rica)
7mo Piso, Mall Multicentro
Avenida Central, Calle 6
Desamparados
Costa Rica

Ver mapa
Participar en el evento
Difundir este evento:
FacebookTwitterLinkedIn
divider
Second Live Event 2016 - EX² Outcoding
                      Expositor: 
                                 Perfil LinkedIn Leonardo Murillo Z Leonardo Murillo Zeledón
                     Agenda: 
                               - Introducción a AWS y la nube.
                               - Introducción a Appium.
                               - Introducción al AWS Device Farm. ¿Qué es y para qué sirve?
                                * Receso
                               - Configurando el IDE.
                               - Creando tests básicos.
                               - Configuración de Device Farm.
                               - Probando nuestra aplicación de muestra.

- Cóctel de Bienvenida
- Coffee Break

 ¡Registrate Hoy Mismo!
  ENTRADA GRATUITA - CUPO LIMITADO

Compartí este evento con colegas y amigos a través de Facebook y Twitter
¡Esperamos contar con tu asistencia!

Saludos,
EX² Outcoding Solutions

 EX² Outcoding Solutions SRL
Desamparados, Costa Rica
 Dirección de Waze - EX² Outcoding Solutions

viernes, 17 de junio de 2016

Q4 FY16 SAAS AND PAAS REVENUES WERE UP 66%, AND UP 68% IN CONSTANT CURRENCY

Press Release

Q1 FY17 SaaS and PaaS Revenues Expected to be Up 75% to 80%

Redwood Shores, Calif.—Jun 16, 2016

Oracle Corporation (NYSE: ORCL) today announced fiscal 2016 Q4 results. Total Q4 Revenues were $10.6 billion, down 1% in U.S. dollars and flat in constant currency. Cloud plus On-Premise Software Revenues were $8.4 billion, flat in U.S. dollars and up 2% in constant currency. Cloud software as a service (SaaS) and platform as a service (PaaS) revenues were $690 million, up 66% in U.S. dollars and up 68% in constant currency. Total Cloud revenues, including infrastructure as a service (IaaS), were $859 million, up 49% in U.S dollars and up 51% in constant currency. Operating Income was $4.0 billion, and Operating Margin was 37%. Non-GAAP Operating Income was $4.8 billion, and the non-GAAP Operating Margin was 45%. Net Income was $2.8 billion while non-GAAP Net Income was $3.4 billion. Earnings Per Share was $0.66, while non-GAAP Earnings Per Share was $0.81. Without the impact of the U.S. dollar strengthening compared to foreign currencies, Oracle’s reported GAAP Earnings Per Share would have been 2 cents higher and non-GAAP Earnings Per Share would have been 1 cent higher.

Short-term deferred revenues were $7.7 billion, up 6% in U.S. dollars and up 7% in constant currency compared with a year ago. Operating cash flow on a trailing twelve-month basis was $13.6 billion.

For fiscal 2016, Total Revenues were $37.0 billion, down 3% in U.S. dollars and up 2% in constant currency. Cloud plus On-Premise Software Revenues were $29.0 billion, down 2% in U.S. dollars and up 3% in constant currency. Cloud SaaS and PaaS revenues were $2.2 billion, up 49% in U.S. dollars and up 52% in constant currency. Total Cloud revenues, including IaaS, were $2.9 billion, up 36% in U.S dollars and up 40% in constant currency. Operating Income was $12.6 billion, and Operating Margin was 34%. Non-GAAP Operating Income was $15.8 billion and non-GAAP Operating Margin was 43%. Net Income was $8.9 billion while non-GAAP Net Income was $11.2 billion. Earnings Per Share was $2.07, while Non-GAAP Earnings Per Share was $2.61. Without the impact of the U.S. dollar strengthening compared to foreign currencies, Oracle’s reported GAAP and non-GAAP Earnings Per Share would have been 17 cents higher.

“Fourth quarter SaaS and PaaS revenue growth accelerated to 68% in constant currency, significantly higher than my guidance,” said Oracle CEO, Safra Catz. “SaaS and PaaS gross margins continued to improve throughout the year, exiting FY16 at 56%. Bookings in Q4 were also very strong enabling us to raise our guidance for Q1 SaaS and PaaS revenue growth, which we now expect to be between 75% and 80%.”

“We added more than 1,600 new SaaS customers and more than 2,000 new PaaS customers in Q4,” said Oracle CEO, Mark Hurd. “In Fusion ERP alone, we added more than 800 new cloud customers. Today, Oracle has nearly 2,600 Fusion ERP customers in the Oracle Public Cloud – that’s ten-times more cloud ERP customers than Workday.”

“We expect that the SaaS and PaaS hyper-growth we experienced in FY16 will continue on for the next few years,” said Oracle Executive Chairman and CTO, Larry Ellison. “That gives us a fighting chance to be the first cloud company to reach $10 billion in SaaS and PaaS revenue. We’re also very excited about the availability of version 2 of Oracle’s Infrastructure as a Service (IaaS)—which will enable us to speed up the growth of our IaaS business, which customers want to buy in conjunction with our SaaS and PaaS.”

The Board of Directors also declared a quarterly cash dividend of $0.15 per share of outstanding common stock. This dividend will be paid to stockholders of record as of the close of business on July 6, 2016, with a payment date of July 27, 2016.

Q4 Fiscal 2016 Earnings Conference Call and Webcast

Oracle will hold a conference call and webcast today to discuss these results at 2:00 p.m. Pacific. You may listen to the call by dialing (816) 287-5563, Passcode: 425392. To access the live webcast of this event, please visit the Oracle Investor Relations website at http://www.oracle.com/investor. In addition, Oracle’s Q4 results and fiscal 2016 financial tables are available on the Oracle Investor Relations website.

A replay of the conference call will also be available by dialing (855) 859-2056 or (404) 537-3406, Pass Code: 28515799.
·          


size=2 width="100%" align=center>  

FBI: Update PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data.

BUSINESS E-MAIL COMPROMISE: THE 3.1 BILLION DOLLAR SCAM


This Public Service Announcement (PSA) is an update to the Business E-mail Compromise (BEC) information provided in Public Service Announcements (PSA) 1-012215-PSA and 1-082715a-PSA. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data.
DEFINITION

BEC is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices.
STATISTICAL DATA

The BEC scam continues to grow, evolve, and target businesses of all sizes. Since January 2015, there has been a 1,300% increase in identified exposed losses1. The scam has been reported by victims in all 50 states and in 100 countries. Reports indicate that fraudulent transfers have been sent to 79 countries with the majority going to Asian banks located within China and Hong Kong.

The following BEC statistics were reported to the IC3 and are derived from multiple sources to include IC3 victim complaints and complaints filed with international law enforcement agencies and financial institutions:
Domestic and International victims:22,143
Combined exposed dollar loss:$3,086,250,090
The following BEC statistics were reported in victim complaints to the IC3 from October 2013 to May 2016:
Domestic and International victims:15,668
Combined exposed dollar loss:$1,053,849,635
  • Total U.S. victims:
14,032
  • Total U.S. exposed dollar loss:
$960,708,616
  • Total non-U.S. victims:
1,636
  • Total non-U.S. exposed dollar loss:
$93,141,019

BACKGROUND


The victims of the BEC scam range from small businesses to large corporations. The victims continue to deal in a wide variety of goods and services, indicating a specific sector does not seem to be targeted.

It is largely unknown how victims are selected; however, the subjects monitor and study their selected victims using social engineering techniques prior to initiating the BEC scam. The subjects are able to accurately identify the individuals and protocols necessary to perform wire transfers within a specific business environment. Victims may also first receive “phishing” e-mails requesting additional details regarding the business or individual being targeted (name, travel dates, etc.).

Some individuals reported being a victim of various Scareware or Ransomware cyber intrusions immediately preceding a BEC incident. These intrusions can initially be facilitated through a phishing scam in which a victim receives an e-mail from a seemingly legitimate source that contains a malicious link. The victim clicks on the link, and it downloads malware, allowing the actor(s) unfettered access to the victim’s data, including passwords or financial account information.

The BEC scam is linked to other forms of fraud, including but not limited to: romance, lottery, employment, and rental scams. The victims of these scams are usually U.S. based and may be recruited as unwitting money mules.2 The mules receive the fraudulent funds in their personal accounts and are then directed by the subject to quickly transfer the funds to another bank account, usually outside the U.S. Upon direction, mules may open bank accounts and/or shell corporations to further the fraud scheme.

SCENARIOS OF BEC

Based on IC3 complaints and other complaint data3 , there are five main scenarios by which this scam is perpetrated. BEC victims recently reported a new scenario (Data Theft) involving the receipt of fraudulent e-mails requesting either all Wage or Tax Statement (W-2) forms or a company list of Personally Identifiable Information (PII). This scenario does not always involve the request for a wire transfer; however, the business executive’s e-mail is compromised, either spoofed or hacked, and the victims are targeted in a similar manner as described in Scenario 2 of the BEC scam.
Scenario 5 (New): Data Theft

Fraudulent requests are sent utilizing a business executive’s compromised e-mail. The entity in the business organization responsible for W-2s or maintaining PII, such as the human resources department, bookkeeping, or auditing section, have frequently been identified as the targeted recipient of the fraudulent request for W-2 and/or PII. Some of these incidents are isolated and some occur prior to a fraudulent wire transfer request. Victims report they have fallen for this new BEC scenario, even if they were able to successfully identify and avoid the traditional BEC incident. The data theft scenario (Scenario 5) of the BEC first appeared just prior to the 2016 tax season.

Scenario 1: Business Working With a Foreign Supplier

A business, which often has a long standing relationship with a supplier, is requested to wire funds for invoice payment to an alternate, fraudulent account. The request may be made via telephone, facsimile, or e-mail. If an e-mail is received, the subject will spoof the e-mail request so it appears very similar to a legitimate account and would take very close scrutiny to determine it was fraudulent. Likewise, if a facsimile or telephone call is received, it will closely mimic a legitimate request. This particular scenario has also been referred to as “The Bogus Invoice Scheme,” “The Supplier Swindle,” and “Invoice Modification Scheme.”

Scenario 2: Business [Executive] Receiving or Initiating a Request for a Wire Transfer

The e-mail accounts of high-level business executives (CFO, CTO, etc) are compromised. The account may be spoofed or hacked. A request for a wire transfer from the compromised account is made to a second employee within the company who is normally responsible for processing these requests. In some instances, a request for a wire transfer from the compromised account is sent directly to the financial institution with instructions to urgently send funds to bank “X” for reason “Y.” This particular scenario has also been referred to as “CEO Fraud,” “Business Executive Scam,” “Masquerading,” and “Financial Industry Wire Frauds.”

Scenario 3: Business Contacts Receiving Fraudulent Correspondence through Compromised E-mail

An employee of a business has his/her personal e-mail hacked. This personal e-mail may be used for both personal and business communications. Requests for invoice payments to fraudster-controlled bank accounts are sent from this employee’s personal e-mail to multiple vendors identified from this employee’s contact list. The business may not become aware of the fraudulent requests until that business is contacted by a vendor to follow up on the status of an invoice payment.

Scenario 4: Business Executive and Attorney Impersonation

Victims report being contacted by fraudsters, who typically identify themselves as lawyers or representatives of law firms and claim to be handling confidential or time-sensitive matters. This contact may be made via either phone or e-mail. Victims may be pressured by the fraudster to act quickly or secretly in handling the transfer of funds. This type of BEC scam may occur at the end of the business day or work week and be timed to coincide with the close of business of international financial institutions.

CHARACTERISTICS OF BEC COMPLAINTS

The IC3 has noted the following characteristics of BEC complaints:
  • Businesses and associated personnel using open source e-mail accounts are predominantly targeted.
  • Individuals responsible for handling wire transfers within a specific business are targeted.
  • Spoofed e-mails very closely mimic a legitimate e-mail request.
  • Hacked e-mails often occur with a personal e-mail account.
  • Fraudulent e-mail requests for a wire transfer are well-worded, specific to the business being victimized, and do not raise suspicions to the legitimacy of the request.
  • The phrases “code to admin expenses” or “urgent wire transfer” were reported by victims in some of the fraudulent e-mail requests.
  • The amount of the fraudulent wire transfer request is business-specific; therefore, dollar amounts requested are similar to normal business transaction amounts so as to not raise doubt.
  • Fraudulent e-mails received have coincided with business travel dates for executives whose e-mails were spoofed.
  • Victims report that IP addresses frequently trace back to free domain registrars.

SUGGESTIONS FOR PROTECTION AND BEST PRACTICES


Businesses with an increased awareness and understanding of the BEC scam are more likely to recognize when they have been targeted by BEC fraudsters, and are therefore more likely to avoid falling victim and sending fraudulent payments.

Businesses that deploy robust internal prevention techniques at all levels (especially targeting front line employees who may be the recipients of initial phishing attempts), have proven highly successful in recognizing and deflecting BEC attempts.

Some financial institutions reported holding their customer requests for international wire transfers for an additional period of time, to verify the legitimacy of the request.

The following is a compilation of self protection strategies provided in the BEC PSAs from 2015.
  • Avoid free web-based e-mail accounts: Establish a company domain name and use it to establish company e-mail accounts in lieu of free, web-based accounts.
  • Be careful what is posted to social media and company websites, especially job duties/descriptions, hierarchal information, and out of office details.
  • Be suspicious of requests for secrecy or pressure to take action quickly.
  • Consider additional IT and financial security procedures, including the implementation of a 2-step verification process. For example -
    • Out of Band Communication: Establish other communication channels, such as telephone calls, to verify significant transactions. Arrange this second-factor authentication early in the relationship and outside the e-mail environment to avoid interception by a hacker.
    • Digital Signatures: Both entities on each side of a transaction should utilize digital signatures. This will not work with web-based e-mail accounts. Additionally, some countries ban or limit the use of encryption.
    • Delete Spam: Immediately report and delete unsolicited e-mail (spam) from unknown parties. DO NOT open spam e-mail, click on links in the e-mail, or open attachments. These often contain malware that will give subjects access to your computer system.
    • Forward vs. Reply: Do not use the “Reply” option to respond to any business e-mails. Instead, use the “Forward” option and either type in the correct e-mail address or select it from the e-mail address book to ensure the intended recipient’s correct e-mail address is used.
    • Consider implementing Two Factor Authentication (TFA) for corporate e-mail accounts. TFA mitigates the threat of a subject gaining access to an employee’s e-mail account through a compromised password by requiring two pieces of information to login: something you know (a password) and something you have (such as a dynamic PIN or code).
Significant Changes: Beware of sudden changes in business practices. For example, if a current business contact suddenly asks to be contacted via their personal e-mail address when all previous official correspondence has been through company e-mail, the request could be fraudulent. Always verify via other channels that you are still communicating with your legitimate business partner.
  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, legitimate e-mail of abc_company.com would flag fraudulent e-mail of abc-company.com.
  • Register all company domains that are slightly different than the actual company domain.
  • Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign-off by company personnel.
  • Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments.
  • Carefully scrutinize all e-mail requests for transfers of funds to determine if the requests are out of the ordinary.
Additional information is publicly available on the United States Department of Justice website www.justice.gov publication entitled “Best Practices for Victim Response and Reporting of Cyber Incidents”.

WHAT TO DO IF YOU ARE A VICTIM

If funds are transferred to a fraudulent account, it is important to act quickly:
  • Contact your financial institution immediately upon discovering the fraudulent transfer
  • Request that your financial institution contact the corresponding financial institution where the fraudulent transfer was sent
  • Contact your local Federal Bureau of Investigation (FBI) office if the wire is recent. The FBI, working with the United States Department of Treasury Financial Crimes Enforcement Network, might be able to help return or freeze the funds
  • File a complaint, regardless of dollar loss, at www.IC3.gov
When contacting law enforcement or filing a complaint with the IC3, it is important to identify your incident as “BEC”, provide a brief description of the incident, and consider providing the following financial information:
  • Originating4 Name:
  • Originating Location:
  • Originating Bank Name:
  • Originating Bank Account Number:
  • Recipient5 Name:
  • Recipient Bank Name:
  • Recipient Bank Account Number:
  • Recipient Bank Location (if available):
  • Intermediary Bank Name (if available):
  • SWIFT Number:
  • Date:
  • Amount of Transaction:
  • Additional Information (if available) - including “FFC”- For Further Credit; “FAV” – In Favor Of:

Filing a complaint with IC3

Victims should always file a complaint regardless of dollar loss or timing of incident at www.IC3.gov and, in addition to the financial information, provide the following descriptors:
  • IP and/or e-mail address of fraudulent e-mail
  • Date and time of incidents
  • Incorrectly formatted invoices or letterheads
  • Requests for secrecy or immediate action
  • Unusual timing, requests, or wording of the fraudulent phone calls or e-mails
  • Phone numbers of the fraudulent phone calls
  • Description of any phone contact to include frequency and timing of calls
  • Foreign accents of the callers
  • Poorly worded or grammatically incorrect e-mails
  • Reports of any previous e-mail phishing activity

1. Exposed dollar loss includes actual and attempted loss in United States dollars.  
2.Money mules are defined as persons who transfer money illegally on behalf of others. 
3.Multiple source complaint data, not limited to IC3, describing the BEC scam is dated as far back as 2009.  
4.The term "Originating" is synonymous with the term "Victim".  
5.The term "Recipient" is synonymous with the term "Beneficiary" 

Oracle Hot Topics: Production Database Is Not Coming Up due to problem with LDAP

Knowledge Articles


Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Fri, 17 Jun 2016 03:37 GMT-06:00

miércoles, 15 de junio de 2016

Safra Catz, Oracle CEO: The computer sciences lose too many girls too early and once lost

“It takes 25 years to build a computer engineer, not 25 hours, so we need to get started. The computer sciences lose too many girls too early and once lost, it’s nearly impossible to get them back. We want more girls focused on building upon science and math fundamentals and we want more women choosing the technical disciplines because they are both prepared to do so and because they believe it will advance their career opportunities.” 


Oracle Hot Topics: Knowledge Article Product Area Last Updated OPatch error: "Inventory load failed... OPatch cannot load inventory for the given Oracle Home."


Knowledge Articles


Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Wed, 15 Jun 2016 05:25 GMT-06:00

lunes, 13 de junio de 2016

Oracle Hot Topics and News: 07/10 Jun 2016


Knowledge Articles

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Fri, 10 Jun 2016 21:05 GMT-06:00


Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Thu, 9 Jun 2016 04:08 GMT-06:00

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition Oracle GoldenGate
Tue, 7 Jun 2016 06:03 GMT-06:00

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Mon, 13 Jun 2016 05:36 GMT-06:00