Todos los Sábados a las 8:00PM

Ahora a suscribirse y seguir el contenido de este blog.

viernes, 30 de octubre de 2015

La historia detrás de la calabaza de Halloween


¿Alguna vez te has preguntado por qué se utilizan las calabazas como candiles en Halloween? El origen de esta tradición se creó cuando los irlandeses migraron a Estados Unidos a partir 1848 y llevaron consigo la leyenda de la lámpara de Jack, la cual causó la popularidad de tallar calabazas durante Halloween.

En el libro “The Jack Lantern Ghost” de la cronista estadounidense Nancy Rhyne, se narra la leyenda de la siguiente forma:

Mientras Jack el tacaño bebía el último trago de una botella de whisky en una taberna, observó que el diablo estaba sentado a su lado. Jack quien siempre había sido un hombre inteligente decidió ofrecerle un trato. Así que le propuso su alma a cambio de una copa de vino y pagar todas las bebidas que había consumido.

Sin dudar, el demonio aceptó el pacto y pronto se convirtió en una moneda para pagar al cantinero. Pero al verlo vulnerable, Jack decidió guardar la moneda en su bolsillo junto a una cruz de plata y así impedir que Satanás se liberara hasta prometer que no reclamaría su alma en diez años. Lucifer no tuvo más remedio que aceptar el trato.

Diez años más tarde, Jack y el diablo se encontraron en un bosque para saldar su deuda. Pero antes de que Satán se llevara su alma, Jack le pidió un último deseo –¿Podrías bajarme aquella manzana del ese árbol por favor? – El demonio pensó que no perdía nada y de un salto llegó a la copa, mientras buscaba la manzana, Jack marcó rápidamente una cruz en la corteza del árbol y le obligó prometer que jamás le pediría su alma nuevamente. El señor del infierno no tuvo más remedio que aceptar.

Unos años más tarde Jack murió, pero no pudo entrar al cielo porque durante toda su vida había sido un borracho y un estafador. Entonces fue al infierno, pero el diablo lo reconoció y lo envió de vuelta para no faltar a su promesa de tomar su alma –¿A dónde iré ahora? preguntó Jack, el diablo le contestó –vuelve por donde viniste.

El camino de regreso era oscuro y frío por eso el demonio le lanzó un carbón encendido para que pudiera caminar en la penumbra. Jack colocó el pedazo de carbón en un nabo que había vaciado para que no se apagara con el viento… ahora vaga sin rumbo y con su linterna para toda la eternidad.

Sin embargo, cuando los irlandeses llegaron a Estados Unidos remplazaron el uso del nabo por una calabaza para simbolizar el carbón del diablo y desde ese momento se convirtió en una importante tradición de Halloween.

Tor launches anti-censorship Messenger service

Tor Messenger can allow encrypted communications even to services blocked by the user's own country
A new chat tool has been launched in an effort to improve the security of online messaging.
Tor Messenger allows users to chat over the Tor (The Onion Router) network in a way which hides the location of participants.
It means that the contents of messages will only be visible to the participants.
The service will also work with platforms like Facebook even in countries where they are banned.
The tool is currently in beta and will undergo security tests.
Users wishing to remain anonymous or access chat clients blocked in their own country could use Tor Messenger to chat via services like Facebook Chat, Google Talk, Twitter, Yahoo and Internet Relay Chat.
The program does not communicate via what's often called the "dark web", a collection of hidden websites and services, but rather by sending messages across a series of internet relays (or routers) so that their origin cannot be tracked.
These relays are called "bridges".

Bypassing blocks

"They're computers run by volunteers and in a censored area your computer will connect to these," explained Steven Murdoch, a security researcher at University College London who has worked on Tor projects.
"Those services are not publicly listed anywhere - they should not be blocked even if access to the Tor network is blocked."
In addition, messages may be encrypted to provide additional security. This feature is enabled by default, though both parties in a one-to-one chat would have to have off-the-record encryption (OTR) set up.
This requires the two parties to exchange a secret key which is needed to decode the messages they send to each other.

Interest in privacy

"At the end of the day some people really do need privacy and security so this would be important to them," commented Jim Killock, executive director of the Open Rights Group.
He also told the BBC that he imagined the tool, once audited, could be used by whistleblowers, individuals wanting to complain about corruption or sources desiring to speak to journalists anonymously about a story.
"I think it shows the worries people have that chats and other clients are being snooped on," he added.
Dr Murdoch also made the point that while the service was still being tested, it shouldn't be used by those who have serious security concerns.
"It's good for people to experiment with but not if you've got serious security requirements yet," he told the BBC.

Larry Ellison had a hilarious answer when a Wall Street analyst asked him to increase Oracle's dividends

Source: businessinsider.com

Larry Ellison, Oracle's founder, executive chairman and CTO, was in good spirits as he took questions from Wall Street analysts on Thursday.

Oracle execs and analysts were gathered during the company's big annual tech conference that took place this week San Francisco.

One of his best moments was when an analyst asked him why Oracle didn't try boosting investor confidence in the shares with the tried-and-true strategy of increasing dividends.

The shares are down about 13% since a high of almost $45 in June. Investors are waiting to see how well Oracle can ramp up its all-important cloud computing business. Last quarter, the board declared a 15 cent dividend.

Ellison loved the idea of boosting dividends, he joked. That's because he's Oracle's largest individual shareholder. He owns 27% of the company with nearly 1.2 billion shares.

Without missing a beat he quipped:

"You’re not going to get me to come out against increasing the dividend," and he giggled out loud. "I think that’s a hell of an idea, maybe 4% would be good. Start a petition. I’ll be the first to sign!" he laughed some more. "Actually, I have my truck out front. I can pick up my share."

The funny thing is, he probably wouldn't mind a bigger dividend. Ellison rarely sells his Oracle shares and given how much he spends (mansions, private golf courses, a Hawaiian island, jets, cars, the America's Cup ...) he's been known to borrow money to smooth out his cash flow. Last year, he used a fraction of his Oracle stake as collateral to secure a $10 billion personal line of credit.

But when he stopped laughing at the thought of a truckload of cash coming his way, he did answer the question more seriously.

He wants Oracle to have the cash on hand to do a big acquisition when the time is right.

"We use our money for a variety of things. We buy back stock, we pay dividends. We haven’t made any large acquisitions for a while. You know? We’re kind of saving our nickels and dimes. We might do something interesting, one of these days. Not anytime soon. We are singularly focused not on acquisitions but on maturing our cloud business."

The one big acquisition he's not planning on making? EMC. When asked about that he said, " I can tell you, we’re not bidding for EMC."

jueves, 29 de octubre de 2015

FBI: Business E-Mail Compromise

Business E-Mail Compromise
An Emerging Global Threat
08/28/15
The accountant for a U.S. company recently received an e-mail from her chief executive, who was on vacation out of the country, requesting a transfer of funds on a time-sensitive acquisition that required completion by the end of the day. The CEO said a lawyer would contact the accountant to provide further details.
“It was not unusual for me to receive e-mails requesting a transfer of funds,” the accountant later wrote, and when she was contacted by the lawyer via e-mail, she noted the appropriate letter of authorization—including her CEO’s signature over the company’s seal—and followed the instructions to wire more than $737,000 to a bank in China.
The next day, when the CEO happened to call regarding another matter, the accountant mentioned that she had completed the wire transfer the day before. The CEO said he had never sent the e-mail and knew nothing about the alleged acquisition.
The company was the victim of a business e-mail compromise (BEC), a growing financial fraud that is more sophisticated than any similar scam the FBI has seen before and one—in its various forms—that has resulted in actual and attempted losses of more than a billion dollars to businesses worldwide.
 
How to Avoid Becoming a Victim of a BEC Scam
In October 2013, the Internet Crime Complaint Center (IC3) began receiving complaints from businesses about trusted suppliers requesting wire transfers that ended up in banks overseas—and turned out to be bogus requests. Since then, losses from the business e-mail compromise (BEC) scam have been significant.
“For victims reporting a monetary loss to the IC3, the average individual loss is about $6,000,” said Ellen Oliveto, an FBI analyst assigned to the center. “The average loss to BEC victims is $130,000.” IC3 offers the following tips to businesses to avoid being victimized by the scam (a more detailed list of strategies is available at www.ic3.gov):
- Verify changes in vendor payment location and confirm requests for transfer of funds.
- Be wary of free, web-based e-mail accounts, which are more susceptible to being hacked.
- Be careful when posting financial and personnel information to social media and company websites.
- Regarding wire transfer payments, be suspicious of requests for secrecy or pressure to take action quickly.
- Consider financial security procedures that include a two-step verification process for wire transfer payments.
- Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail but not exactly the same. For example, .co instead of .com.
- If possible, register all Internet domains that are slightly different than the actual company domain.
- Know the habits of your customers, including the reason, detail, and amount of payments. Beware of any significant changes.
 
“BEC is a serious threat on a global scale,” said FBI Special Agent Maxwell Marker, who oversees the Bureau’s Transnational Organized Crime–Eastern Hemisphere Section in the Criminal Investigative Division. “It’s a prime example of organized crime groups engaging in large-scale, computer-enabled fraud, and the losses are staggering.”
Since the FBI’s Internet Crime Complaint Center (IC3) began tracking BEC scams in late 2013, it has compiled statistics on more than 7,000 U.S. companies that have been victimized—with total dollar losses exceeding $740 million. That doesn’t include victims outside the U.S. and unreported losses.
The scammers, believed to be members of organized crime groups from Africa, Eastern Europe, and the Middle East, primarily target businesses that work with foreign suppliers or regularly perform wire transfer payments. The scam succeeds by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques. Businesses of all sizes are targeted, and the fraud is proliferating.
According to IC3, since the beginning of 2015 there has been a 270 percent increase in identified BEC victims. Victim companies have come from all 50 U.S. states and nearly 80 countries abroad. The majority of the fraudulent transfers end up in Chinese banks.
Not long ago, e-mail scams were fairly easy to spot. The Nigerian lottery and other fraud attempts that arrived in personal and business e-mail inboxes were transparent in their amateurism. Now, the scammers’ methods are extremely sophisticated.
“They know how to perpetuate the scam without raising suspicions,” Marker said. “They have excellent tradecraft, and they do their homework. They use language specific to the company they are targeting, along with dollar amounts that lend legitimacy to the fraud. The days of these e-mails having horrible grammar and being easily identified are largely behind us.”
To make matters worse, the criminals often employ malware to infiltrate company networks, gaining access to legitimate e-mail threads about billing and invoices they can use to ensure the suspicions of an accountant or financial officer aren’t raised when a fraudulent wire transfer is requested.
Instead of making a payment to a trusted supplier, the scammers direct payment to their own accounts. Sometimes they succeed at this by switching a trusted bank account number by a single digit. “The criminals have become experts at imitating invoices and accounts,” Marker said. “And when a wire transfer happens,” he added, “the window of time to identify the fraud and recover the funds before they are moved out of reach is extremely short.”
In the case mentioned above—reported to the IC3 in June—after the accountant spoke to her CEO on the phone, she immediately reviewed the e-mail thread. “I noticed the first e-mail I received from the CEO was missing one letter; instead of .com, it read .co.” On closer inspection, the attachment provided by the “lawyer” revealed that the CEO’s signature was forged and the company seal appeared to be cut and pasted from the company’s public website. Further assisting the perpetrators, the website also listed the company’s executive officers and their e-mail addresses and identified specific global media events the CEO would attend during the calendar year.
The FBI’s Criminal, Cyber, and International Operations Divisions are coordinating efforts to identify and dismantle BEC criminal groups. “We are applying all our investigative techniques to the threat,” Marker said, “including forensic accounting, human source and undercover operations, and cyber aspects such as tracking IP addresses and analyzing the malware used to carry out network intrusions. We are working with our foreign partners as well, who are seeing the same issues.” He stressed that companies should make themselves aware of the BEC threat and take measures to avoid becoming victims (see sidebar).
If your company has been victimized by a BEC scam, it is important to act quickly. Contact your financial institution immediately and request that they contact the financial institution where the fraudulent transfer was sent. Next, call the FBI, and also file a complaint—regardless of dollar loss—with the IC3.
“The FBI takes the BEC threat very seriously,” Marker said, “and we are working with our law enforcement partners around the world to identify these criminals and bring them to justice.”
Resources:
Public service announcement about the business e-mail compromise scam
More about the IC3
- For more information about reporting or responding to business cyber attacks, read the U.S. Department of Justice publication Best Practices for Victim Response and Reporting of Cyber Incidents.

Argentina: Oracle DB 2015 Explorando Oracle Performance Database, 3 de noviembre 2015

Oracle DB 2015
Inicio: Martes, 3 de noviembre de 2015, 09:00 hs 
Finaliza: Martes, 3 de noviembre de 2015, 13:00 hs
Lugar: Oracle Argentina - Juana Manso 1069 7mo Piso, CABA
Organiza: AROUG -Database & Rac aroughq@gmail.com
¡Asegura tu lugar!
Si no ves la imagen podes acceder al link del Evento https://eventioz.com.ar/e/oracle-db-2015 




ASISTIR AL EVENTO
Comparte este evento con tus amigos en las redes sociales.
Compartir en Facebook Compartir en Twitter Compartir en LinkedIn Compartir en Google+
¡Te esperamos!

Lanic News 29 de Octubre de 2015

Panel sobre transferencias de direcciones IP en LACNIC 24

Durante el panel informativo realizado en la reunión anual de LACNIC en Bogotá en los últimos días de septiembre se expresaron diver...

Cuatro nuevos directores de LACNIC

Los asociados de LACNIC culminaron el proceso de elección de cuatro cargos del Directorio de la organización con la selección de los ...

IPv6, un muy buen negocio para ampliar clientes

Una de las redes privadas de Internet más extensas de América Latina y el Caribe ya está ofreciendo sus servicios en IPv6 lo que les ...

Fondos FRIDA: habrá cuatro convocatorias en 2016

El Fondo Regional para la Innovación Digital en América Latina y el Caribe (FRIDA) prevé realizar en 2016 cuatro convocatorias para...

LACNIC Caribbean on the Move y CaribNOG se encuentran en Belice

Un destacado grupo de expertos en tecnología se darán cita en Belice del 2 al 6 de noviembre, semana en que esta capital recibirá una...

Larry Ellison Kicks Off Oracle

OpenWorld 2015 with Introduction of New Oracle Cloud Services and Ease-of-Use Advances

Press Release

New capabilities on every layer of Oracle Cloud are designed for lower cost, higher reliability and performance, always-on security, open standards, and compatibility with private clouds
Oracle OpenWorld, San Francisco—Oct 26, 2015

Oracle Executive Chairman and CTO Larry Ellison introduced more than a dozen new Oracle Cloud services and capabilities in the opening keynote presentation at Oracle OpenWorld 2015 in San Francisco’s Moscone Center.



Ellison outlined six design goals for Oracle Cloud: cost, reliability, performance, standards, compatibility, and security. In the transition to cloud computing, Ellison said, businesses are in “the middle of a generational shift in computing that is no less important than our shift to personal computing.” And he demonstrated a new just-in-time learning system that will be available within Oracle’s Software-as-a-Service applications.



Oracle Cloud advances highlighted by Ellison included:
·         A new discrete manufacturing suite as part of Oracle SCM Cloud
·         E-Commerce in Oracle’s CX Cloud to enable business-to-consumer commerce
·         Exadata Cloud Service, based on Oracle’s high performance Exadata Database Machine
·         Modern, mobile-friendly user interface for SaaS applications
·         Oracle Multitenant Database Cloud scales to more than 4,000 pluggable databases
·         Real Application Clusters (RAC) in the Cloud, fault-tolerant database availability in the cloud
·         Database In-Memory Acceleration for faster performance of joins, expressions, and JSON scan and filter
·         Database In-Memory on Active Data Guard
·         Multitenant Java Server, high density, low cost, secure cloud platform
·         Fault-Tolerant Java Server, continuous availability and transparent deployment in multiple data centers
·         Big Data Preparation, Discovery, and Visualization Cloud Services

Quotes from Larry Ellison’s keynote presentation:

·         “We went into the SaaS business, and came to understand that required us to be in the platform business. And we went into the platform business and came to understand we had to be in the infrastructure-as-a-service business. That’s how we got to where we are today.”
·         “On-premises computing is not going to vanish. Even if on-premises computing eventually becomes a smaller piece of the pie than cloud computing, there's going to be a long period of transition.”

·         “We're standards-based, and because we're compatible—our cloud is compatible to what you have on premise—it's very easy to lift and shift. It's very easy to take workloads you already have, databases you already have, and move them to the cloud.”

miércoles, 28 de octubre de 2015

Evento Privado Crux Consultores

Con gran placer, estaré el próximo sábado 31 de octubre participando en un grupo de charlas a lo interno de nuestro Sponsor Crux Consultores.

En esta ocasión, estaré brindado dos charlas con enfoques a nivel de seguridad en el manejo de datos dentro de las organizaciones.

Manejo de Datos en la 3era Plataforma Tecnológica con Oracle
  • Retos y Desafíos de la seguridad de la información en las nuevas bases de datos en entornos de Nube
  • Transformación de la información en las bases de datos, con la inclusión de datos de la tercera plataforma tecnológica ( datos no estructurados BIG DATA, redes sociales, Móvil y IOT ( Internet de las cosas ):
  • Invasión a la privacidad.
  • Prioridades de IT y manejadores del mercado hacia el 2020 en seguridad de la información.
  • Consolidación de Bases de Datos, cambio en el entorno de la gestión de la información.
  • Mayor cantidad de datos en control de pocas manos. Es esto seguro. ?  Como mitigar el riesgo de fuga de información. ?
  • Explosión de la información en las bases de datos con el Big Data.
  • Mayor recopilación de datos sensibles tanto personales, como corporativos
  • Seguridad a profundidad de la información
  • ( Disociación de datos, firewalls de base de datos, Evaluación y cumplimiento de normas internacionales de seguridad )
  • La transformación hacia un mundo Hyper-conectado:
  • Cambio en la visión de seguridad en sitio a la nube.
Oracle Database 12c, Una perspectiva desde el punto de vista de seguridad.
  • Los datos dentro de nuestras empresas: Desafíos para las organizaciones
  • Manejo efectivo de los ambientes computacionales a través de la consolidación y manejo adecuado de recursos
  • Asegurando el almacenamiento de la información de la empresa
  • El manejo de datos en la 3era Plataforma Tecnológica
  • El Reto de asegurar la información dentro de la base de datos.

Oracle Cloud Applications Drive Business Transformation Around the World

Press Release

Organizations worldwide select Oracle’s complete and integrated suite of cloud applications

ORACLE OPENWORLD, SAN FRANCISCO—Oct 27, 2015

Organizations worldwide are increasingly adopting Oracle Cloud Applications to grow faster, differentiate from competitors and better serve their customers. A complete and fully integrated suite of cloud applications for every function in the enterprise, Oracle Cloud Applications enable organizations across all industries to quickly and easily adopt modern best practices, increase business agility, reduce complexity and costs, and succeed in a digital world.

To deliver the experiences customers expect, attract and retain the talent required to succeed, and achieve the performance that today’s digital economy demands, organizations across all industries need to transform their critical business functions and embrace modern best practices. This transformation requires complete, integrated and modern business applications that provide business users with quick and easy access to social, mobile and analytic capabilities.

“In today’s business environment, there is no room for mistakes and organizations that do not adopt modern best practices across all their critical business functions will struggle to survive,” said Steve Miranda, Executive Vice President of Applications Development, Oracle. “With Oracle Cloud Applications, Oracle provides a comprehensive and integrated suite of modern business applications that increase business agility and reduce costs. As a result, organizations across every industry are increasingly selecting Oracle Cloud Applications to transform the way they do business.”

Oracle Customer Experience Cloud (Oracle CX Cloud)

Oracle CX Cloud empowers organizations to improve experiences, enhance loyalty, differentiate their brands, and drive measurable results across all channels, touchpoints and interactions. Organizations such as a major African airline company, a global car manufacturer and multinational manufacturer of consumer and professional products are using Oracle CX Cloud to deliver consistent and personalized customer experiences.

Oracle Human Capital Management Cloud (Oracle HCM Cloud)

Oracle HCM Cloud provides organizations with modern HR technologies that enable collaboration, optimize talent management, provide complete workforce insights, increase operational efficiency, and make it easy for everyone to connect on any device. Organizations such as a major insurance provider, financial services business and home manufacturer are using Oracle HCM Cloud to find and retain the best talent and increase global agility.

Oracle Enterprise Resource Planning Cloud (Oracle ERP Cloud)

Oracle ERP Cloud provides organizations with complete, robust and modern ERP capabilities across financials, procurement, and project portfolio management, as well as Enterprise Performance Management (EPM), Governance Risk and Compliance (GRC) and Supply Chain Management (SCM). Organizations such as a music streaming provider, global payments processer and food distributor are leveraging Oracle ERP Cloud to increase operational efficiency and reduce costs. 

Oracle Cloud Solutions

Oracle provides one of the industry’s broadest and most complete portfolio of public, private, and managed cloud offerings to offer customers the choice of deployment model. Oracle Cloud delivers a broad suite of public cloud services across DaaS, SaaS, PaaS, and IaaS. Oracle also provides a rich portfolio of products and managed cloud services to deliver enterprise private clouds.

Additional Information

Contact Info
Asad Mushtaq
Oracle
+44 (0)207.562.7068
asad.mushtaq@oracle.com

Diana Wong
Oracle
+1.650.506.2757
diana.wong@oracle.com

Webinar mañana: Oracle ADF Rápido y Furioso

jue, 29 de oct de 2015, 12:00 - 13:00 CST
Registro

Oracle Application Development Framework (ADF) es el framework utilizado internamente en Oracle para sus desarrollos propios, tales como sus aplicaciones Cloud, como así también para otros productos como JD Edwards. 

Quizás no es un framework muy conocido, pero ofrece ventajas muy importantes, principalmente en su manera de trabajar con la capa de Modelo en la arquitectura Modelo-Vista-Controlador (MVC).
En el seminario, se hará una introducción "rápida" de ADF para aquellos que tienen experiencia en MVC o aquellos que quieren iniciarse en el desarrollo de aplicaciones utilizando este framework.
También se demostrará un desarrollo "furioso" de un ejemplo para comprender sus virtudes y utilidad en nuevos proyectos.

Oracle premia a CaixaBank por su proyecto de Big Data

Oracle Caixabank
Fuentes de CaixaBank afirman que este proyecto ha permitido "agilizar el proceso de toma de decisiones y desarrollar nuevos servicios financieros y bancarios a partir de la gestión masiva de datos en cualquier formato".

Durante la tercera jornada del OpenWorld 2015, que se está celebrando esta semana en San Francisco, Oracle entregó los Oracle Excellent Awards en los que premia la puesta en marcha de un proyecto con tecnología de Oracle.

Dentro de los Oracle Cloud Platform Innovation, CaixaBank recibió el premio de Big Data, Business Analytics e Integración de Datos por haber puesto en marcha un proyecto de Big Data que ha permitido a la entidad financiera “agilizar el proceso de toma de decisiones y desarrollar nuevos servicios financieros y bancarios a partir de la gestión masiva de datos en cualquier formato”.

Fuentes de CaixaBank destacaron que “la implantación del proyecto comenzó en octubre de 2013 y finalizó en febrero de 2014”. A grandes rasgos, éste consistió en “trasladar toda la información de más de 10 datamarts en un único repositorio” con el fin de “romper todos los silos de información de siete áreas de negocio”.

Con este proyecto “hemos acercado el Big Data al cliente final” y “hemos logrado personalizar el servicio teniendo en cuenta las preferencias de los clientes”. Es una herramienta “sencilla y muy fácil de utilizar por nuestros clientes” que “permite responder a cualquier solicitud de información de negocio sencilla y rápidamente, seleccionando el grupo de datos adecuado y extrayendo la información más relevante”.

A nivel técnico “la infraestructura ofrece una alta capacidad de proceso, lo que da respuesta rápida y ágil al negocio, con más de 2 petabytes de capacidad de almacenamiento, alta disponibilidad y contingencia”.

Aunque la relación entre CaixaBank y Oracle se remonta a “hace más de 20 años” a la hora de implantar este proyecto, la entidad bancaria también valoró la oferta de “los otros 3 principales proveedores”.

CaixaBank, además, ha confirmado que tras este proyecto ya están estudiando la manera de implantar “el Big Data en la cloud para las empresas” lo que se denomina “Big Data as a Service”.

Bárbara Madariaga. San Francisco
http://www.ituser.es/

Seminario Gratuito: Evento Explorando Oracle 12c

Evento Explorando Oracle 12c


El Grupo de usuarios los invita a un evento gratuito en las oficinas de Oracle Argentina el martes 3 de noviembre a las 9 horas.

En este evento de medio día, se recorrerán algunas características de la base de datos Oracle 12c como por ejemplo la opción In-Memory, como mejorar la performance y aspectos de auditoría.


No desaproveches esta oportunidad de conocer a otros expertos de tecnología Oracle en este evento en las flamantes oficinas de Oracle Argentina en puerto madero.
Explorando Oracle 12c en Oracle Argentina inscripción

Agenda

3 de Noviembre de 2015

 09:00 - 09:15
Apertura
 09:15 - 10:00
In Memory Database - Gerardo Tezza
 10:00 - 10:45
Mejorando Performance con SQL Profiles  - Ing. Rita Nuñez
 10:45 - 11:15
Break
 11:15 - 12:00
Concurrentes EBS- BEST PRACTICES - Ing. Cristian Peque
 12:00 - 12:45
Oracle 12c : Introduccion a Auditoria Unificada - Sebastian D'Alessandro
 12:45 - 13:00
Cierre
Facebook
Facebook
Twitter
Twitter
Website
Website
Email
Email

OOW 2015

Oracle Open World 2015 está a punto de culminar, y el grupo de usuarios estuvo presente en el evento. Conocé más sobre las presentaciones que se hicieron en nuestra sección exclusiva para miembros enwww.aroug.org 

Visita OTNLA

La comunidad de Oracle Technology Network en español sigue muy activa y te invita a formar parte registrándote, agregando tu blog o enviando tu experiencia en formato de white paper.
Visitá la página y unite a la comunidad OTN LA.
Somos una organización independiente que representa y vincula a toda la comunidad tecnológica Oracle de Argentina. Inscribite ya aquí
Forward
Share
Tweet
Share
+1

Optimismo para una vida Mejor

Optimismo para una vida Mejor
Noticias buenas que comentar