Webinars


Is there a topic you would like covered but do not see here? We are happy to take webinar suggestions. Email us at [email protected].

Did you miss a webinar? As an ODTUG member, you can view all of our past webinars at any time. Just log in and you will see the link for the recorded list. Not a member? Join now for $99!

Our webinar calendar is constantly evolving! Check back frequently, as more webinars will be added to the schedule.

Suggest a Topic   Past ODTUG Webinar


APEX.pngThursday, November 30, 2017 12:00 PM - 1:00 PM EST
 apex.world On Air - Recognizing and Preventing Security Threats in APEX Applications: Part 1 of  2
 Dan McGhan and Joel Kallman Oracle Corporation, Juergen Schuster IT-Beratung, ACE Director.jpg Martin D'Souza Insum Solutions, ACE Director.jpgScott Spendolini, 
                
Sumner Technologies       
      

These days, information security is of paramount concern. But are you taking all of the proper steps with your APEX applications to ensure that no vulnerabilities exist? Security is so critical - and often overlooked - that we’ve dedicated the next two episodes to covering it. In the first episode, we’ll cover the basics of APEX-related security - from the instance to page settings, XSS and SQLi, and everything in between. We’ll also take a look at some database features that should be considered. 


In the second episode, we’ll take a thorough look at three tools that can help automate the detection and mitigation of security vulnerabilities in your APEX applications - the built-in APEX Advisor, the commercially available ApexSec, and the open source tool APEX-SERT. While each of these tools is slightly different, the aim is the same: to assist in identifying potential threats and help developers mitigate them as efficiently as possible. 

Register Here


Database.pngTuesday, December 5, 2017 12:00 PM - 1:00 PM EST
 SQL Developer: Three Features You're Not Using but Should Be
Jeff Smith, Oracle Corporation

You write SQL, get results. 

You click around objects, get data to Excel. 

You write PL/SQL, compile it, and view your errors. 

That describes what 80% of our users do in Oracle SQL Developer. This session will expose three features that will turbo-charge your experience with SQL Developer and the Database. This session aims to make you more productive and valuable to your Oracle Database development organization. 

Learn how to take those 600 files you currently have all of your handcrafted SQL in and turn them into interactive reports. 

Learn how to find stuff in your database by taking advantage of PL/Scope and our search feature. 

Learn how to build your own screens—that's right, learn how to use a bit of basic XML and SQL to extend SQL Developer to do what you want it to do. 

Register Here



BI.pngTuesday, December 12, 2017 3:00 PM - 4:00 PM EST
 Oracle Analytics: Cloud or On-premise, You're Doing It Wrong - Part 2 of 2
ACEAss-01.pngChristian Berg, Dimensionality GmbH

Turning the standard best-practice/how-to presentation format on its head, this presentation will look at some real-life OACS or OBI implementations and where it all went wrong. We’ll look at the worst, the weirdest, the most absurd and the wackiest ways the Oracle Analytics tool is abused: 

  • How did projects get to these points? 
  • What were the original misconceptions? 
  • How to counter these misconceptions? 
  • Why are “it works” and “it fulfills the requirements” not only not enough but rather dangerous pitfalls? 
  • Can I actually jeopardize the future of my BI system by choosing a cheap quick and dirty approach? 
  • Is it ever OK to simply execute without comprehension? 

This session will give attendees a deeper understanding of the impact seemingly innocuous design and implementation decisions can have on the stability and success of an entire Analytics system. An end-to-end view of the stack will be taken, covering areas including logical modelling, analysis design, and architectural topics. The importance of a holistic view and an appreciation of alternatives will be emphasized as well as the need to understand, comprehend, and reflect on the implications of a “best practice” being followed, as well as the technology stack simply being misunderstood. Attendees will be in a position to better weigh and judge implementation options knowing their long-term effect and impacts in terms of: 

  • user experience 
  • performance 
  • upgrade capability 
  • ease-of-use 
  • reproduciblity 

Register Here


Database.png Wednesday, December 13, 2017 12:00 PM - 1:00 PM EST
  2017 CodeTalk Series: Oracle Database Multilingual Engine: JavaScript In the Database 
  Dan McGhan and  Matthias Brantner, Oracle Corporation

The 2017 CodeTalk Series Webinars are Co-sponsored by ODTUG and IOUG.

Oracle Database 12c Multilingual Engine (MLE) enables developers to work efficiently with DB-resident data in modern programming languages and development environments of their choice. Starting with JavaScript, MLE provides users with a way to run stored procedures and user-defined functions written in JavaScript or TypeScript.

Through various demonstrations, attendees will learn (1) how NPM modules can be deployed and executed inside the database and (2) how JavaScript stored procedures can be used to reduce network round-trips & data transfer.

Register Here


APEX.pngThursday, December 14, 2017 12:00 PM - 1:00 PM EST
 apex.world On Air - Recognizing and Preventing Security Threats in APEX Applications: Part 2 of 2
Dan McGhan, and Joel Kallman, Oracle Corporation Juergen Schuster, IT-Beratung, ACE Director.jpgMartin D'Souza, Insum Solutions, ACE Director.jpgScott Spendolini,
                Sumner Technologies

These days, information security is of paramount concern. But are you taking all of the proper steps with your APEX applications to ensure that no vulnerabilities exist? Security is so critical - and often overlooked - that we’ve dedicated the next two episodes to covering it. In the first episode, we’ll cover the basics of APEX-related security - from the instance to page settings, XSS and SQLi, and everything in between. We’ll also take a look at some database features that should be considered. 

In the second episode, we’ll take a thorough look at three tools that can help automate the detection and mitigation of security vulnerabilities in your APEX applications - the built-in APEX Advisor, the commercially available ApexSec, and the open source tool APEX-SERT. While each of these tools is slightly different, the aim is the same: to assist in identifying potential threats and help developers mitigate them as efficiently as possible. 

Register Here


EPM.pngTuesday, December 19, 2017 3:00 PM - 4:00 PM EST
 HFM to FCCS Cloud Metadata Conversion Process  
Abhi Nerurkar, EPMWare

Ready to move from HFM to FCCS with the latest updates from Oracle Corporation? In a live environment, we will demonstrate how
to load your HFM metadata file into EPMware, map dimensions & convert it into an FCCS application, and deploy metadata
to the cloud without having to learn any EPM Automate scripting. EPMware simplifies your move from HFM to Oracle's FCCS,
allows several team members to build an FCCS hierarchy concurrently, and provides an audit trail of the entire
conversion process.

Register Here
 


Database.pngTuesday, January 9, 2018 3:00 PM - 4:00 PM EST
Accelerating Testing Using Data Virtualization
Tim Gorman, Delphix

How much testing do you perform in your BI/DW environments? Do you even have a test environment? Do you test in production?

The biggest problem with testing in BI and DW environments is the size and velocity of data. Databases and applications have grown enormous and complex. "Storage is cheap" is simply not true. Need proof? Ask for 10 TB to provision a new test environment.

Provisioning a full environment for each developer or tester on each task of each project appears unrealistic, when each might require several terabytes or even petabytes of storage. And so everyone is limited to working in a small handful of shared environments that are refreshed only every few months, if ever, and both code quality and data quality suffer.

Data virtualization is the solution. Using thin-provisioning technologies, virtual databases and file systems only consume space from changed blocks, so it is possible to provision virtual terabytes for only a few actual megabytes. Coders and testers have full and independent read-write environments provided quickly in which to develop and test, improving code quality. Learn about the technical details behind this solution.

When I first heard about data virtualization, it sounded far-fetched, just a trick. Instead, it is the perfect solution to the perfect storm of more data quickly. Every IT shop will need to know how to provision test environments faster using less storage. It's not a matter of "if," but "when." 

Register Here


Database.pngThursday, February 8, 2018 3:00 PM - 4:00 PM EST
Barriers to Oracle Database in IaaS Cloud
Tim Gorman, Delphix

IaaS cloud vendors, such as AWS, prefer that everyone migrate to the cloud, but what often happens is that non-production migrates for cost reasons but production stays on-premises. This phased path to the cloud can leave IT with a split personality: production on-premises on legacy proprietary UNIX platforms, non-production in the cloud on commodity Linux platforms. 

Because the security risk on non-production systems is much higher than production, there is a requirement to mask personally identifiable information or confidential data before it is copied to non-production. Data virtualization employs thin cloning, snapshots, and network-attached data presentation, reducing cloning from hours or days to minutes. But there is more: your legacy UNIX (i.e. AIX, Solaris, HP-UX) databases aren't going anywhere off-premises because the cloud is based on Intel (i.e. Linux, Windows). So what to do? 

In this session, learn how data virtualization and data masking make "split-brain IT" not just possible but desirable. 

Register Here