My interview with Connor McDonald, part of the AskTom team, we talk about everything from robotics, the Commodore 64 to the Cloud Perth born and breed, support nice guy. #Growthmindset #KeepLearning #Success
From punch cards to Oracle 19c. Author, Oracle developer advocate, PL/SQL guru and all around nice guy. My interview with Steven Feuerstein. #GrowthMindset #KeepLearning #Success
#Oracle #Success #Growthmindset #KeepLearning
Sarandipity, don’t accept magic, and keep learning.
#GrowthMindset #Success #Oracle
Oracle #Performance #GrowthMindset Smart and all around nice guy.
Milena Gerova and I discuss the growth of the Bulgarian Oracle Users Group / BGOUG /, some of the challenges she’s faced, what she looks for in a team member and other exciting things. Now, us southerners are proud of our Hospitality; Milena and her team demonstrate a level of hospitality I have rarely experienced. She is indeed, one of my favorite people in the world.
Kamil is passionate about IT, Oracle Databases, and information security. Kamil will be talking about how he got into IT, what challenges he’s facing, and what it takes to succeed. Tune in Friday March 27th at 1430 (GMT-5)
Tuesday February 4th 2020 there will be a security meetup in Helsinki Finland. I will be there speaking on Secure coding and the impact of emerging technology will have on security.
Julian Dontcheff will be speaking on “The Power of Autonomous Database Security”
Kamil Stawiarski will be doing two hacking sessions.
- Oracle Hacking Session The live demo, presenting a real-life experience in penetration testing of the consolidated Exadata database environment
- Oracle Hacking Session – part II. We believe so much in technology, that we stopped believing in people.
Hope to see everyone there, this will be exciting. https://www.ougf.fi/events/security-meetup/
It’s been a year long process now the book is finally been released. There are a few things I would have written different and a few other subjects I would have liked to cover. Perhaps that will come in my next book or future posts.
In this book we cover Secure Coding, setting up Encryption, and audit. We also dive deep into performing privilege analysis.