PODCAST:
Oracle has recently introduced the new Exadata Database Machine X-28. Listen to this podcast featuring Ron Weiss to learn more about this new product and how it can enhance your company.
WEBCAST:
Businesses have more data to manage than ever before and they are also charged with keeping the costs of storage down. Oracle Database 11g introduces a comprehensive set of technologies to help address these challenges.
WEBCAST:
In this webcast, AbitibiBowater, the eighth largest publicly traded pulp and paper manufacturer in the world, shares how they successfully virtualized mission-critical Oracle solutions such as JD Enterprise One, Oracle Databases and Oracle Business Intelligence data warehouses.
SOFTWARE DOWNLOAD:
IBM Migration Toolkit for DB2 - The IBM Migration Toolkit is an easy-to-use tool that allows you to migrate your data from a wide variety of source databases to either DB2 or Informix, regardless of platform. This website has many resources to get you started including a demo, articles and toolkit downloads.
VIDEO:
Watch this 10 minute video and discover what Oracle compatibility means for your business from a technical, and skills point of view. This video also offers multiple low risk strategies for using Postgres Plus Advanced Server to lower your Oracle costs and utilize the advantages of the most advanced open source database available.
WEBCAST:
View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
VIDEO:
DB2 automates many routine database administration tasks like database configuration, storage allocation, and memory management. Self-optimizing features automatically react to changes in workloads to adjust memory and optimize system performance. Watch this flash demo to learn why some are referring to DB2 as smarter database software.
SOFTWARE DEMO:
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.