domingo, 13 de septiembre de 2015

Oracle Test Fest @ OPN CENTRAL 26 al 29 de Octubre de 2015


Participe en el Test Fest @ OPN Central y conviértase en un ¡Especialista Certificado OPN! 


Regístrese ahora para el Test Fest y realice hasta 2 exámenes gratis! Conozca la lista completa de exámenes para cada área:


Con la certificación de Especialista OPN:
Group
·         aumenta su credibilidad en el mercado;
·         ayuda a su compañía a obtener un mayor nivel de especialización en el programa OPN Specialized;
·         es reconocido por su expertise y habilidades.

Elija entre las diez sesiones, realice su examen y participe de un sorteo sorpresa.

¡Los esperamos en San Francisco!


Exhibit

Día 1 - Lunes, 26 de octubre
Sesión 1: 10:30 - 12:30
Sesión 2: 13:00  - 15:00
Sesión 3: 15:30  - 17:30

Día 3 - Miércoles, 28 de octubre
Sesión 6: 10:30 -12:30
Sesión 7: 13:00  - 15:00
Sesión 8: 15:30  - 17:30


Día 2 - Martes, 27 de octubre
Sesión 4: 10:00  - 12:00
Sesión 5: 15:45  - 17:45


Día 4 - Jueves, 29 de octubre
Sesión 9:  11:00  - 13:00
Sesión 10: 13:30  - 15:30

Para cualquer duda o información, por favor, envíe un e-mail a: opn-edu_ww@oracle.com

Oracle Corporation
Facebook  Twitter  linkedIn  Instagram  Blog    #OOW15
Integrated Cloud Applications & Platform Services

Copyright © 2015, Oracle Corporation. All rights reserved.
 

Oracle Corporation - Worldwide Headquarters, 500 Oracle Parkway, OPL - E-mail Services, Redwood Shores, CA 94065, United States

Esta comunicación le ha sido enviada debido a su acuerdo actual de miembro de Oracle PartnerNetwork (OPN). Es posible que no se han tenido en cuenta las preferencias para quedar excluido de correo electrónico con marketing general para asegurarnos de que recibe la información de este programa. Si ha sido designado como administrador de OPN es posible que no pueda excluirse la recepción de comunicaciones de Oracle PartnerNetwork; para obtener información adicional, consulte su acuerdo de OPN.

Puede iniciar sesión en su cuenta de Oracle Partner Store e inscribirse para recibir actualizaciones específicas de soluciones OPN o bien puede anular la suscripción a correos electrónicos generales de Oracle Marketing en cualquier momento. Observe que anular las comunicaciones de marketing no afectará a la recepción de comunicaciones empresariales importantes relativas a su relación actual con Oracle como actualizaciones de seguridad, notificaciones de inscripción para eventos, gestión de cuentas y comunicaciones sobre soporte/servicio.

Oracle Hot Topics: 10/13 Sept 2015


Knowledge Articles

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Thu, 10 Sep 2015 04:31 GMT-06:00

Knowledge Article
Product Area
Last Updated
Oracle Database - Standard Edition Oracle Database - Enterprise Edition
Fri, 11 Sep 2015 04:55 GMT-06:00

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Fri, 11 Sep 2015 07:25 GMT-06:00



"This message contains information according to the preferences you set in My Oracle Support. To modify your settings or to turn off this automated message, login to My Oracle Support (http://support.oracle.com) and click on 'More' -> 'Settings' -> 'Hot Topics E-mail'" My Oracle Support

Java Code Geeks

Facebook
Twitter
LinkedIn
Google Plus
Email
Your Weekly JCG Top Picks

Week's Top Picks from JCG


Going into the Weekend, chill out with our Top Picks:

How to use Java 8 Functional Programming to Generate an Alphabetic Sequence (by Java Code Geeks)
I’ve stumbled upon an interesting Stack Overflow question by user “mip”. The question was: :I’m looking for a way of generating an alphabetic sequence: A, B, C, ..., Z, AA, AB, AC, ..., ZZ." This can be quickly recognised as the headings of an Excel spreadsheet, which does precisely that...

Spring Data Rest Example (by JCG Examples)
In the previous few examples we demonstrated how the different spring data modules are configured and their support for the NoSql databases. In this example, I will demonstrate how we can expose our CRUD Repository as a REST Web-Service over the HTTP. We will be using MySQL as the database for this project.
 
jQuery UI Autocomplete Example (by Web Code Geeks)
In this example, we’re going through a very useful widget of jQuery, autocomplete(). Autocomplete enables users to quickly find and select from a pre-populated list of values as they type, leveraging searching and filtering. Any field that can receive input can be converted into an Autocomplete, namely, elements,

Mi canal en http://www.slideshare.net/

Slides y Video disponibles para bajar: Performance Tuning: Como escribir y correr correctamente una sentencia SQL

jueves, 10 de septiembre de 2015

INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER CRIME

Source: FBI


The Internet of Things (IoT) refers to any object or device which connects to the Internet to automatically send and/or receive data.
As more businesses and homeowners use web-connected devices to enhance company efficiency or lifestyle conveniences, their connection to the Internet also increases the target space for malicious cyber actors. Similar to other computing devices, like computers or Smartphones, IoT devices also pose security risks to consumers. The FBI is warning companies and the general public to be aware of IoT vulnerabilities cybercriminals could exploit, and offers some tips on mitigating those cyber threats.

What are some IoT devices?

  • Automated devices which remotely or automatically adjust lighting or HVAC
  • Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings
  • Medical devices, such as wireless heart monitors or insulin dispensers
  • Thermostats
  • Wearables, such as fitness devices
  • Lighting modules which activate or deactivate lights
  • Smart appliances, such as smart refrigerators and TVs
  • Office equipment, such as printers
  • Entertainment devices to control music or television from a mobile device
  • Fuel monitoring systems

How do IoT devices connect?

IoT devices connect through computer networks to exchange data with the operator, businesses, manufacturers, and other connected devices, mainly without requiring human interaction.

What are the IoT Risks?

Deficient security capabilities and difficulties for patching vulnerabilities in these devices, as well as a lack of consumer security awareness, provide cyber actors with opportunities to exploit these devices. Criminals can use these opportunities to remotely facilitate attacks on other systems, send malicious and spam e-mails, steal personal information, or interfere with physical safety. The main IoT risks include:
  • An exploitation of the Universal Plug and Play protocol (UPnP) to gain access to many IoT devices. The UPnP describes the process when a device remotely connects and communicates on a network automatically without authentication. UPnP is designed to self-configure when attached to an IP address, making it vulnerable to exploitation. Cyber actors can change the configuration, and run commands on the devices, potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses, or engage in digital eavesdropping;
  • An exploitation of default passwords to send malicious and spam e-mails, or steal personally identifiable or credit card information;
  • Compromising the IoT device to cause physical harm;
  • Overloading the devices to render the device inoperable;
  • Interfering with business transactions.

What an IoT Risk Might Look Like to You?

Unsecured or weakly secured devices provide opportunities for cyber criminals to intrude upon private networks and gain access to other devices and information attached to these networks. Devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit.

Examples of such incidents:

  • Cyber criminals can take advantage of security oversights or gaps in the configuration of closed circuit television, such as security cameras used by private businesses or built-in cameras on baby monitors used in homes and day care centers. Many devices have default passwords cyber actors are aware of and others broadcast their location to the Internet. Systems not properly secured can be located and breached by actors who wish to stream live feed on the Internet for anyone to see. Any default passwords should be changed as soon as possible, and the wireless network should have a strong password and firewall.
  • Criminals can exploit unsecured wireless connections for automated devices, such as security systems, garage doors, thermostats, and lighting. The exploits allow criminals to obtain administrative privileges on the automated device. Once the criminals have obtained the owner’s privileges, the criminal can access the home or business network and collect personal information or remotely monitor the owner’s habits and network traffic. If the owner did not change the default password or create a strong password, a cyber criminal could easily exploit these devices to open doors, turn off security systems, record audio and video, and gain access to sensitive data.
  • E-mail spam attacks are not only sent from laptops, desktop computers, or mobile devices. Criminals are also using home-networking routers, connected multi-media centers, televisions, and appliances with wireless network connections as vectors for malicious e-mail. Devices affected are usually vulnerable because the factory default password is still in use or the wireless network is not secured.
  • Criminals can also gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispense medicines. Once criminals have breached such devices, they have access to any personal or medical information stored on the devices and can possibly change the coding controlling the dispensing of medicines or health data collection. These devices may be at risk if they are capable of long-range connectivity.
  • Criminals can also attack business-critical devices connected to the Internet such as the monitoring systems on gas pumps. Using this connection, the criminals could cause the pump to register incorrect levels, creating either a false gas shortage or allowing a refueling vehicle to dangerously overfill the tanks, creating a fire hazard, or interrupt the connection to the point of sale system allowing fuel to be dispensed without registering a monetary transaction.

Consumer Protection and Defense Recommendations

  • Isolate IoT devices on their own protected networks;
  • Disable UPnP on routers;
  • Consider whether IoT devices are ideal for their intended purpose;
  • Purchase IoT devices from manufacturers with a track record of providing secure devices;
  • When available, update IoT devices with security patches;
  • Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it operate on a home network with a secured Wi-Fi router;
  • Use current best practices when connecting IoT devices to wireless networks, and when connecting remotely to an IoT device;
  • Patients should be informed about the capabilities of any medical devices prescribed for at-home use. If the device is capable of remote operation or transmission of data, it could be a target for a malicious actor;
  • Ensure all default passwords are changed to strong passwords. Do not use the default password determined by the device manufacturer. Many default passwords can be easily located on the Internet. Do not use common words and simple phrases or passwords containing easily obtainable personal information, such as important dates or names of children or pets. If the device does not allow the capability to change the access password, ensure the device providing wireless Internet service has a strong password and uses strong encryption.

No tan buenas noticias con la liberación de Oracle Database 12c Standard Edition 2

En la última semana, Oracle ha liberado la Edición Estándar de 12c. Esta versión ha sido re-bautizada como Oracle Database 12c SE 2. A partir de 12c, no existe las versiones SE One y SE como las conocíamos a nivel de métricas en la versión anterior de 11g.

La nueva versión Oracle Database 12c SE 2, permite utilizar máximo 2 sockets físicos por servidor, con un máximo de 8 threads por CPU, para un total de 16 threads.

Los usuarios con Oracle Database 11g SE que deseen instalar 12c en la nueva versión, deben migrar sus licencias, con el cuidado respectivo, que si están corriendo en un servidor con más de 2 sockets físicos, no podrán allí hacerlo.

El máximo en una configuración RAC en Oracle Database 12c SE 2, es de 2 sockets físicos por solución. Por tanto, cada equipo puede tener máximo 1 CPU.

Los precios ya fueron actualizados en la lista oficial de Oracle y es importante que lean la nota al pie de documento #95, que explica lo que actualmente les acabo de indicar.

Descarga desde el sitio oficial ( requerido usuario dentro del portal de Oracle )

(12.1.0.2.0) - Standard Edition (SE2)
Download Microsoft Windows x64 (64-bit)File 1File 2  (2.6 GB)
Download Linux x86-64File 1File 2  (2.5 GB)
Download Oracle Solaris (SPARC systems, 64-bit)File 1File 2  (2.7 GB)
Download Oracle Solaris (x86 systems, 64-bit)File 1File 2  (2.5 GB)
Download HP-UX ItaniumFile 1File 2  (3.3 GB)
Download AIX (PPC64)File 1File 2  (2.9 GB)
Download zLinux64File 1File 2  (2.5 GB)

sábado, 5 de septiembre de 2015

Competencia: SAP organiza una maratón para desarrolladores de IoT

Por Agustina Dergarabedian | 4 septiembre, 2015 |

Bajo el formato de maratón, SAP HANA Challenge reconocerá con hasta 25 mil pesos los desarrollos más innovadores basados en Internet de las cosas. El concurso se realizará el próximo 18 de septiembre de 2015 desde las 8 hasta las 20 en Urban Station (Av. San Juan 701, CABA).


SAP HANA CHALLENGELa inscripción ya está abierta en la página del concurso con un cupo limitado a 50 personas.

Los participantes deberán desarrollar una aplicación que resuelva una problemática puntual y corra sobre SAP HANA. Para ello, necesitarán interconectar dispositivos y sensores de temperatura, luz, humedad, movimiento, tensión eléctrica, volumétricos y geolocalizadores.

“Es un concurso exclusivamente para personas con habilidades de programación client-side. Es deseable que tengan conocimientos en HTML5, Javascript y Servicios OData/REST”, señaló Mariano Baca Storni, CEO de Inclusion Services Argentina

El concurso se desarrollará bajo la dinámica de maratón. Los 50 participantes podrán trabajar de forma individual o en grupos de hasta cuatro personas. Al finalizar la jornada, se realizará la entrega de premios según el criterio del jurado y un after office con todos los asistentes.

“Buscamos promover la combinación de ideas innovadoras, desarrollo tecnológico y programación con el objetivo de generar aplicaciones novedosas y disruptivas para la gestión y el desarrollo de los negocios y la sociedad.”, explicó Leandro Estanga, líder del área de operaciones con Partners de SAP para la región Sur.

La actividad es organizada por SAP e Inclusion Services, con el patrocinio de Educación IT y el Gobierno de la Ciudad de Buenos Aires. Además de los 25 mil pesos los participantes compiten por un Apple Watch.

Fuente: SAP Hanna Challenge

Todos los Sábados a las 8:00PM