Generate OTP with Oracle User Messaging Service

Introduction One Time Password (OTP) is used to authenticate an individual based on a single-use alphanumeric credential. The OTP is delivered to the user’s configured delivery method. The user then provides the OTP credential as the response to proceed with the operation. The following are major benefits of using out-of-band …

Oracle Wallet Manager helps to Save Client’s Wallet

About Oracle Wallet Manager – Introduction Security administrators use Oracle Wallet Manager to manage public key security credentials on Oracle clients and servers. The wallets it creates can be read by Oracle Database, Oracle Application Server 10g, and the Oracle Identity Management infrastructure. Oracle Wallet Manager Overview Oracle Wallet Manager …

Loading Oracle Data into Hadoop Using Sqoop

Introduction The era of “big data” and the “cloud” are driving companies to change. Just to keep pace, they must learn new skills and implement new practices that leverage those new data sources and technologies. Transferring big data between different components of big data analytic ecosystem is a common requirement …

Oracle Database Cloud Services

Introduction The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing and the power, productivity and robustness which are the hallmarks of Oracle technology. The Oracle Database Cloud Service is built on Oracle Database technology, running on the Oracle Exadata …

FastTrack your Development using Quick SQL

As Oracle Developers, many times when we try to build a Solution or Proof-of-Concept, we spend a lot of time in creating the database objects. Quick SQL is a wonderful tool to minimize the time and effort in creating the database objects, without compromising the coding standard. It’s like a …

Oracle Virtual Private Database

Oracle Database provides the necessary tools to build secure applications. One such tool is Virtual Private Database (VPD), which is the combination of the following: Fine-grained access control, which enables you to associate security policies to database objects Application context, which enables you to define and access application or database …