SQL PolyBase setup issues

In my most recent blog post, Unified data platform and data virtualization through PolyBase: Part Two, I provided a demo of data virtualization through PolyBase.

Read More

Implement Workflow Java Mailer SSL configuration

To secure workflow communications, you can configure an Oracle® application server to use Secure Sockets Layer (SSL).

Read More

Unified data platform and data virtualization through PolyBase: Part Two

In Part One of this UDP data virtualization through PolyBase series, I introduced PolyBase and provided the prerequisites for this demo. In this final installment, you can dive into the demo.

Read More

Unified data platform and data virtualization through PolyBase: Part One

I am excited to finally build on my earlier blog post Unified Data Platform - SQL 2019.

In this series, I dig deep into how to achieve data virtualization through PolyBase®. This post covers the introduction and demo prerequisites, and Part Two gets to the demo itself.

Read More

A brief overview of AWS DBMS services

Amazon® Web Services® (AWS®) provides database (DB) services in both Database-as-a-Service (DBaaS) and Platform-as-a-Service (PaaS) models for both relational and non-relational databases.

Read More

MongoDB 4.2 now available on the ObjectRocket platform

Originally published in November 2020, at ObjectRocket.com/blog

Did you know that MongoDB 4.2 passed our tests and is generally available on the ObjectRocket platform?

Read More

EBS SSO integration with IDCS

The post introduces Oracle Identity Cloud Service (IDCS) integration with the existing Oracle® e-Business Suite® (EBS) environments.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part three

As I mentioned in the introduction in Part one, the end goal is to demonstrate how to control inbound access based on IP address restrictions to one of my two websites running on the Windows® virtual machine (VM). Part two of the series laid the foundation with the the Application Gateway configuration. Now, in this final post of the series, I walk thorough the Web Application Firewall (WAF) policy creation and test the custom rule. I will restrict access to site2.hiteshvadgama.co.uk.

Read More

Configuring a per-site WAF policy with IP address restriction rules: Part two

In Part one of this three-part series, I introduced the concept of the per-site web application firewall (WAF) Policy with IP address rule restrictions and set the stage for this demonstration. Part one also lays out the assumptions for the implementation walkthrough. In this post, I present the Application Gateway configuration.

Read More

Machine learning: Accelerating your model deployment—Part two

As machine learning (ML) initiatives become more prominent across companies looking to leverage their data to improve future projections and decision-making, demand for frameworks that simplify ML model development has been soaring.

Read More