Life At Doyensys – Kishore Kumar R
Employees are the backbone of an organisation. With the right people, a company can not only achieve its goals but also surpass them. We want to thank our employees and…
Read MoreEmployees are the backbone of an organisation. With the right people, a company can not only achieve its goals but also surpass them. We want to thank our employees and…
Read MoreSegregation of Duties (SOD) is a concept that advocates the division of responsibilities within organizations. It is enforced by the Sarbanes Oxley Act (SOX) Act of 2002. This US law…
Read MoreIssue : The form encounters a fatal error: “Form: APXINWKB FRM-30085: Unable to adjust form for output.” The messages is usually associated with a compile warning but in this case,…
Read MoreHow to access HTTPS/SSL URL via utl_http using the orapki wallet command Goal: Our goal is to call/access the HTTPS/SSL url from within PL/SQL The instruction provided here should also work for accessing…
Read MoreInstall and Configure Oracle APEX with ORDS and Apache Tomcat Introduction: In this post, we will discuss about the step by step procedure to install Oracle Application express 19.2 with…
Read MoreDATAGUARD MONITORING ==================== Check DB role(PRIMARY/STANDBY): ================================ SELECT DATABASE_ROLE, DB_UNIQUE_NAME INSTANCE, OPEN_MODE, PROTECTION_MODE, PROTECTION_LEVEL, SWITCHOVER_STATUS FROM V$DATABASE; Monitor standby background process: =================================== SELECT PROCESS, STATUS, THREAD#, SEQUENCE#, BLOCK#, BLOCKS FROM…
Read MoreRMAN Issues and Solutions – (ORA-00020) and (ORA-00245) Error-1: RMAN failed to connect target database with ORA-00020: maximum number of processes (150) exceeded Solution: Here, we can see…
Read MoreThere are two types of partitioned Indexes in Oracle Local Partitioned Index and Global Partitioned Index a. Local Partitioned Indexes Local index is a separate index for each partition. A…
Read MorePGP Key Encryption in AP Payments Generally, the PGP keys will be used to Encrypt and Decrypt the messages transferred between one system to another to enable the security. In…
Read More