Removing Virus / Malware / Trojan From The Website

My site was hacked and now? First thing to do in these cases is to calm down and read this post from beginning to end, not only just read the part that most interests you or the part that you “think” that will solve your problem, but you must first understand how to identify the […]

Read More

Unplug and Plug DB

In previous article we have seen various methods of connecting to and starting and shutting down pluggable databases. This article focuses on steps to unplug the database from container database and then plugging it back to same or another container.  Here I have demonstrated the method using command prompt, whereas you can also manage the […]

Read More

Connecting & Managing Pluggable Database

In previous article we saw the process for creating Container and Pluggable Databases using Database Configuration Assistance (DBCA). There are difference in connecting to pluggable database as compared to those of container database and databases in previous releases. Also the way we need startup and shutdown the pluggable database. It is really surprising and interesting […]

Read More

How To Ensure The Continuity Of IT Services

Companies need to adopt a set of four best practices aimed at ensuring disaster recovery technologies and its availability. The technology is used to support policies for disaster recovery, but is not in itself a solution alone. Managers need to keep in mind that the strategy to manage this type of problem should be a […]

Read More

Cloud Computing: Looking At The Quality Of The Ombudsman

Today there is not the slightest chance of stopping the advance of cloud computing. The vision is that by 2014, 40% of all applications in the world will be based on Virtualized servers. Thus, it is expected that 25% of all existing workload on IT should happen on servers hosted in the cloud. In the […]

Read More