Where exadata stands per regards to availability, security, and easy to use

Dears,
I would like to have details on how exadata could ensure availability, security and storage performance. In other words I know that exadata represent both a database(11g2) and a hosting server for that database. How this hosting service and this configuration could be different from other existing configurations
Thanks in advance
Mohamed Houri

>
But when the system come pre-configured ready to be turned on day one, already configured and secured by the Oracle team, isn't this a problem initself? The Oracle team knows more about the configuration than
the customer who has been delivred the exadata machine does?This is the reason there is documentation provided as part of the hand off. Any new system is, by definition, new and you'll know less about it until you start using it and get accustomed to its configuration and setup. This is the reason you shouldn't expect to put your new system into production immediately, but rather after you've tested it and become familiar with it.
Another question also came to my mind: when there is a problem within this machine can the local DBA/storage/OS team solve the problem without refering to Oracle? Will this not break a support SLA?I'm not sure how you are using the term SLA, but fixing your system yourself doesn't violate any support agreement. Your SLA is your service agreement with your customer and you need to do what you need in order to meet that.
That said, there are some things that you aren't allowed to do (i.e. installing software or making configuration changes on storage cells). But generally speaking, if your system is running normally and has some issue, the issue is more likely related to RAC or RDBMS and changing or fixing things there is within your control to remedy.

Similar Messages

  • There any way to know where my ipad, because it was stolen? and do not use iCloud? besides not remember if you have installed any applications to track it?

    there any way to know where my ipad, because it was stolen? and do not use iCloud? besides not remember if you have installed any applications to track it?

    If you did not set up Find My iPad, then there is no way to track it. Contact the police and change any passwords for any online accounts you may have used from your iPad (the iTunes Store, for instance). 
    Regards.

  • For a good book regarding the network security and management

    i am not a newbie to networking. i have done ccna successfully. now i want to do gain some knowledge regarding the security of the networks.
    i want to know which book i prefer?? or any other good advice..
    Regards

    You don't get books dealing with ASP and MySQL but you can get books that deals with PHP and MySQL.  For example I have used this book (click on it to go to Amazon):
    There are other books as well but this one gets you started quickly and then you can develop your skills buying something more advanced.
    Good luck.

  • Has anyone else discovered that their MacBookPro has been set up for 'no available users' and so cannot use any new applications?

    I've had my MacBook Pro for several months. Sadly I've not been able to use it for my work (I'm a  writer) as I couldn't open my software, Final Draft. I installed it several times, uninstalling it each time to avoid glitches, but every time I tried to open it I had an error message, that the permissions had to be reset. I went onto disk utilities and did everything I could to reset/repair. I spent days and weeks on the phone both to Apple and to Final Draft, but no one could help.
    Apple were adamant that it was a software error and so today I bought yet another version of Final Draft (£140), this time from the net, and downloaded that. Same old same old. Once again, over and over,  I followed the  'trouble shooting permissions' advice on the Apple website, still no luck. Finally, finally, tonight, a technician was able to take me through an obscure routine which ended up with the message that my laptop had been set up with 'No Available Users'.
    In effect it's a useless piece of metal and has been from day one.
    Thanks, Apple.
    Anyone else had a laptop set up for no available user?

    I'm not sure that I followed everything, but you got a replacement phone and continue to experience problems? It sounds like a logical move would be to have AT&T replace your SIM card. I would doubt that the size/fit is an issue, these things are a standard size, but replacing the SIM will have an impact on the network set-up that might be the root cause.

  • Keeping a clean, secure and well performing machine...

    Keeping a clean, secure system is tantamount to good computer performance. How do you do that? There are several things you should do which will ensure the best possibility of keeping a clean, secure and well performing machine:
    1) Install anti-malware software
    There are some very good "Free" programs available that are fully automated and will help to keep your system protected from malicious software. Some of these are listed Here...click the "Free Security Software Links Index" link, then click the "Anti-virus" link.
    2) Practice safe surfing
    "Safe Surfing" requires very little thought really. Using good common sense can help here. Avoid unscrupulous web sites. The "Web Of Trust" will help you identify many of those so you CAN avoid them.
    3) Maintenance
    Maintain your system by performing a disk cleanup and defrag on a regular basis.
    Maintenance requires some planning. Your system accumulates debris from the web. "Debris", in the sense that many of these files are unnecessary to keep.
    Getting rid of that debris is a simple process. Microsoft Windows users will find the free utilities provided by Microsoft, in all "Windows" platforms, are quite useful in helping users to maintain their systems. Those are, Disk Cleanup and Disk Defragmenter. You can find these tools by navigating to"
    All Programs-->Accessories-->System Tools
    ...both are friendly and easy to use. I'd like though, to clear up some confusion regarding the "Defragmenter" utility. Many users will neglect a system defrag based upon the analysis findings. I should address the:
    "You do not need to defragment this volume"
    ...message that the defrag analysis returns.
    You see, when Microsoft wrote that utility for the Windows platform, there were two distinctly different target audiences to consider. Those are, the corporate and home users. Two very big markets, with very different "needs". The effort and intent was to reach a happy medium when considering the threshold levels that would still work well for both customer bases without causing any significant performance issues for either, should one or the other have to live by those thresholds.
    If I explained that well, then you might understand that the "threshold" Microsoft chose for the defrag utility will flag either customer base when fragmentation reaches...let's say it's about 20% (I really don't know WHAT it is, but I do know it's pretty broad) and anything under that will be flagged as:
    "You do not need to defragment this volume".
    All that means, really, is that you can delay a defrag when an analysis scan returns such a message...but it certainly DOESN'T mean that you should not defrag.
    As a general rule, I will perform a full system defrag when my file fragmentation is beyond 3%. For me, that's about twice a week. For you, let's say it might occur once a month. I don't know, only you would but you should keep an eye on it (make ita habit) and see how long it takes to find your fragmentation at about that level. It can vary widely because it depends on the number of files you create, or delete and what type of applications you run during a "usual" user session.
    Email, for example, is an application (whether native or not) that causes the creation and deletion of files on the hard disk. If you use an online email client, think of the "browser cache" when it comes to the number of emails downloaded and deleted. Those are all files that become fragmented whether they're on the hard disk, or make up the garbage in the browser cache, makes no difference...it's all still disk space no matter how you think of it.
    Don't forget, even if you have your browser set to empty the temp files when you close it, the size of that "dump" file can vacillate, so to empty the cache upon closing the browser makes the next browser session run better but does nothing to assuage disk fragmentation.
    You'll see, if you do that, the system performs well on each session.
    In summary, install Anti-virus software, practice safe surfing, and maintain your computer. Remember to clean the disk first, then perform the system defrag otherwise you'll be sorting the garbage along with fragmented free space and files.
    Keep these principles in mind and your system will perform well giving you years of enjoyable computing.
    Microsoft MVP - Consumer Security
    Member of Alliance of Security Analysis Professionals
    SpywareHammer
    Solved!
    Go to Solution.

    Excellent advice! Thank you for sharing.
    ThinkPad: T530 / X1 Gen 2 / Helix - Yoga: Tablet 2 Pro (Win) / Yoga 3 Pro
    If you find a post helpful and it answers your question, please click the "Accept As Solution" button.
    Lenovo Advocate ~ I am not employed by Lenovo or Microsoft. I am a volunteer.
    Microsoft MVP - Consumer Security
    SpywareHammer

  • HT5312 How or where do I go to update my security questions?

    How or where do I go to update my security questions?

    Go to:
    https://appleid.apple.com/
    Click "Manage My Account", sign in, and go to the Password and Security section. Answer the security questions and you'll be taken to a screen where you can then change them. If you've forgotten your answers, there should be a link just under the security questions fields where you can have a reset email sent to your Rescue email address. If the link for the email doesn't appear, as can happen if you didn't set a rescue email address or (apparently) have a .Mac email address, go here:
    http://www.apple.com/emea/support/itunes/contact.html
    to report the issue to the iTunes Store.
    Regards.
    Forum Tip: Since you're new here, you've probably not discovered the Search feature available on every Communities page, but next time, it might save you time (and everyone else from having to answer the same question multiple times) if you search a couple of ways for a topic, both in the relevant forums and in the Apple Knowledge Base, before you post a question.

  • Regarding Funds availability check in FM9L

    Hi,
    I am developing a custom program to check the funds available in the Fund centre and commitment item before posting.
    In the Tcode FM9L i get the following details where we can check if the fund centre and the commitment item
    are enabled for Budget and posting.                                                                               
    S Lev Funds center/commitment item                       Budget        Posting       
    +   1 FC-SEC               *                                                 
    +   2 6100                 *                                                  X               
    +   3 610ADMN              *                                             X    
    +   3 610MNFG              *                                                 
    +   3 610ENGG              *                                              X                X    
    +   3 610SL                *                                                 X
    +   4 610SLBAR             *                                                 
    +   5 610SLBAP             *                                              X                X    
    +   5 610SLBAS             *                                                 
    I need to pick up those combination which are allowed for Budget & posting,
    is there is any table or method to get those list for which the budget & posting are checked.
    Regards,
    Sayan.

    Hi,
    Check FM
    BP_GET_BUDGET_ELEMENT_FM
    tables of funds management
    Regards,
    Amit

  • After AVG PC Tune up, software update message for security and stability update is available FireFox 3.6.18. Should I Update?

    My Dell laptop (Operating on Windows XP) was hit with multiple viruses - I could not open Mozilla Firefox or any other applications for that matter. After much time and many attempts, I was finally able to install and run an AVG Scan and then an AVG PC Tune up. 4,559 problems found and repaired. After the repairs, I received the following message:
    "Software Update - A security and stability update for Firefox is available: Firefox 3.6.18 - It is strongly recommended that you apply this update for Firefox as soon as possible. - an underlined link reading, "View more information about this update" and then 2 choices - "Ask Later" or "Update Firefox." Since part of the problem was with Firefox and some error messages pointed to that, I'm hesitant to click on any of the three options above. Can you help me to get past this error message, please. I am sending this from my home computer. Thank you. Diane

    Sometimes the updater gets in a funny state - Go to http://www.mozilla.org/en-US/firefox/new/ and download the full installer. Close Firefox and run the installer

  • How can I add/change art work to albums where the art work isn't available at iTunes?

    How can I add/change art work to albums where the art work isn't available at iTunes?

    Go to google and search for the artwork.  When you find it, save it to your computer.  Right click the album and select get info.  Drag the image you saved to the empty box for album art.

  • [svn:osmf:] 17499: Partial fix for FM-990: prevent RTE when attempting smoothing for an image where a policy file was not available

    Revision: 17499
    Revision: 17499
    Author:   [email protected]
    Date:     2010-08-27 11:05:22 -0700 (Fri, 27 Aug 2010)
    Log Message:
    Partial fix for FM-990: prevent RTE when attempting smoothing for an image where a policy file was not available
    Ticket Links:
        http://bugs.adobe.com/jira/browse/FM-990
    Modified Paths:
        osmf/trunk/framework/OSMF/org/osmf/elements/ImageElement.as

    Revision: 17499
    Revision: 17499
    Author:   [email protected]
    Date:     2010-08-27 11:05:22 -0700 (Fri, 27 Aug 2010)
    Log Message:
    Partial fix for FM-990: prevent RTE when attempting smoothing for an image where a policy file was not available
    Ticket Links:
        http://bugs.adobe.com/jira/browse/FM-990
    Modified Paths:
        osmf/trunk/framework/OSMF/org/osmf/elements/ImageElement.as

  • Need info regarding Oracle UCM Accounts and Security Groups behaviour

    Need information regarding Oracle UCM Accounts and Security Groups behaviour.
    Oracle UCM version: 11.1.1.5.0
    Steps:
    1. Log in with "weblogic" user and created a content with id "content1"
    2. Applied "@acc1(R)" and "TestGroup1" to the cotent created in step 1
    3. Log out
    4. Log in as "acc1user1", the user is not able to see the "content1"
    5. Log out
    6. Log in as "role1user1", the user is not able to see the "content1"
    Account and Group information:
    1. User "acc1user1" is part of "@acc1(R)"
    2. User "role1user1" is part of "role1(R)" and is mapped to "TestGroup1" in UCM
    Expected:
    Both "acc1user1" and "role1user1" should be able to see "content1" as they have at least Read permission.
    Please help me understand why the users are not able to see the content.

    ACLs, like Accounts, are optional security setting which may add on some extra functionality to mandatory security groups. Likewise, the resulting permission is taken as an intersection of SG and ACLs.
    But in the second part the number of set of users is huge (approx say 600)I don't get this completely. Does this mean that those "sets of users" (users who see the same data) are distinct and that there is 600 of such groups?
    If you read thoroughly the manual I sent earlier, there is a recommendation that there should be maximum 50 security groups, and you should use accounts, should this number be exceeded. This means you could have all the documents in one security group (and have one common role with Read permission), but combine it with accounts. ACLs are not a good choice here - their performance and manageability is much worse than of accounts. ACLs are primarily used if you expect security settings to change during the lifetime (e.g. a project manager adds temporarily rights to access an item to another user, and revokes it when the user finishes his or her work).
    Note that accounts as well as permissions of users within accounts can also be mapped externally (from LDAP/AD) and it usually follows some kind of org chart.
    I'd feel more comfortable not to speak about users, security groups, roles, etc., but about some real-life objects and scenarios.

  • I keep receiving the Security and stability update is available for my 3.6.17 version of Firefox but it will not download. What should I do?

    #
    I keep receiving the Security and stability update is available for my 3.6.17 version of Firefox but it will not download. What should I do? edit
    # Details
    BoldItalic

    There's no 3.6.18, so there appears to be a glitch in the update checking. Or the message is not really from Firefox (malware site).

  • Is a solo window saying "A security and stability update is available." to install FF26 really valid or is it bogus?or

    Here is what the questionable window looks like:
    upper left corner/across and down
    ln1 (ff global logo) "Software Update"
    ln2 "Update available"
    ln3 "A security and stability update for Firefox is available:
    ln4 "Firefox 26.0"
    ln5 "It is strongly reco'd that you apply this update for FF asap.
    ln6 HTML Link "View more info about this update"
    ln7 (bottom of window) "ask Later" button and "Update FF" button
    While entering this info the window went away!!!
    Before it did i could not copy any of the text (do have screen shot however) and the link did not resolve to any web address. Looked like std FF page but NEVER seen anything like it before!
    no way i was going to click anything except the close [X] button.
    If it is valid, you need to remove the restrictions on it; to make it less suspicious.
    If it is bogus, do you have a plugin or addon to intercept such malicious probes?
    Currently using FF25.0.1; on xp/sp3
    thanks
    NET2868 friday 12-20-2013 mid (EST)

    Firefox 26.0 is available for updates.
    Do you get this update offered if you open Help > About?
    You can find the full version of the latest Firefox 26.0 release in all languages and for all Operating Systems here if you want to install manually:
    *http://www.mozilla.org/en-US/firefox/all.html

  • Cannot syn iphotos . says " Not enough memory where as i have 34 gig available on ipad

    cannot syn iphotos . says " Not enough memory where as i have 34 gig available on ipad

    FYI.. it's storage space not memory.
    Try restarting your iPad. Press and hold the sleep / wake button until you see the red slider then swipe to the right to power off. Then press and hold the sleep / wake button until you see the Apple logo.
    Restart your computer.
    Now try syncing photos.

  • HT5616 Where do I go to change me security questions and answer to sign into the iTunes Store

    Where do I go to change the question and answer to sign into the iTunes Store

    Alternatives for Help Resetting Security Questions and Rescue Mail
         1. Apple ID- All about Apple ID security questions.
         2. Rescue email address and how to reset Apple ID security questions
         3. Apple ID- Contacting Apple for help with Apple ID account security.
         4. Fill out and submit this form. Select the topic, Account Security.
         5.  Call Apple Customer Service: Contacting Apple for support in your
              country and ask to speak to Account Security.
    How to Manage your Apple ID: Manage My Apple ID

Maybe you are looking for