Concurrent request receiving Could Not Lock Request when canceling
After submitting concurrent request, the phase of the request is RUNNING and never completing. When we search for the database session, it is not having…
Read MoreAfter submitting concurrent request, the phase of the request is RUNNING and never completing. When we search for the database session, it is not having…
Read MoreEnterprise are emphasizing on building a culture of proactive sales with responsibility of identifying leads,new account openings and agility in closing deals. To achieve this, organizations are looking towards recent…
Read MoreThe data in a GTT is written to the temporary tablespace, which is not directly protected by redo, so using a GTT improves performance by reducing redo generation. Unfortunately, prior…
Read MoreWhat is it? In previous releases the database stored compilation and execution statistics in a shared sql area which is non persistent. Starting in 12c the database can use a…
Read MoreDuring tuning a query, I found one table has stale statistics. While running gather stats for that table, got below error. Let me demonstrate with a demo table: SQL> execute…
Read MoreThe simplest method is to add a hint to the query to overcome ORA-00001 Added in 11.2, the ignore_row_on_dupkey_index hint silently ignores duplicate values: insert /*+ ignore_row_on_dupkey_index ( acct (…
Read MoreA virtual column applies a function to a column in the table. The database only computes this at runtime. The value is not stored in the table. So instead of…
Read MoreThe smallest unit of data storage in Oracle Database is the block. This defaults to 8k (8,192 bytes). Each index entry must fit within one block. So the maximum size…
Read MoreWhen considering the security, it is important to ensure the availability. Data High availability ensured by achieving below key architecture to preventing downtime. Data Availability: Ensure that we are not…
Read MoreData Safe is a control center for your Oracle Databases which helps understand the sensitivity of data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess…
Read More