SSL certificates in the Oracle Database without surprisesNelson Calero
The document discusses the use of SSL certificates in Oracle databases, outlining security principles such as public/private keys, PKI, and proper management of certificates for secure database connections. It provides a step-by-step guide for creating SSL wallets, configuring servers, and implementing SSL in Oracle environments, emphasizing the importance of proper authentication and encryption for protecting data. Additionally, it includes historical context and evolution of SSL and TLS protocols relevant to Oracle database systems.
Automate your oracle cloud infrastructure operations v2.0 - OOW19Nelson Calero
The document outlines the automation of Oracle Cloud Infrastructure (OCI) operations, presenting topics such as OCI concepts, CLI tools, and examples of automation techniques. It is tailored for DBAs interested in cloud and DevOps, with an introduction to various OCI services and CLI usage instructions. Additionally, it details how to create and manage resources within OCI through CLI commands and troubleshooting common issues.
Automate your Oracle Cloud Infrastructure operationNelson Calero
The document provides a comprehensive overview of automating Oracle Cloud Infrastructure operations, focusing on Oracle Cloud concepts, CLI tools, and automation examples. It outlines offerings for Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), along with practical CLI and REST API examples for managing cloud resources. Targeted toward database administrators and professionals involved in cloud and DevOps, it emphasizes key tools and processes necessary for effective automation in the Oracle Cloud environment.
Automate the operation of your Oracle Cloud infrastructure v2.0Nelson Calero
The document discusses automating Oracle Cloud Infrastructure operations with a focus on CLI tools and examples. It provides insights into different services available in Oracle Cloud, including IaaS offerings, authentication methods, and CLI installation procedures. The target audience includes database administrators interested in cloud and DevOps functionalities.
OpenStack is an open source cloud computing platform that provides infrastructure as a service. It consists of interrelated components that control hardware resources like processing, storage, and networking. The key components include Nova for compute, Glance for images, Cinder for block storage, Swift for object storage, Keystone for identity, Horizon for the dashboard, Ceilometer for metering, and Neutron for networking. OpenStack provides APIs and dashboards to allow users to provision resources on demand.
The document outlines the qualifications and experience of Marcus Vinicius Miguel Pedro, an expert in Oracle Database with over 24 years in the IT industry and various certifications. It also provides an overview of Oracle Cloud Infrastructure (OCI), its key concepts, functionalities, and autoscaling capabilities, including hands-on examples of setting up an OCI environment. Additionally, it discusses challenges associated with on-premises capacity scalability compared to cloud solutions.
The document discusses OpenStack infrastructure architecture and compares OpenStack to VMware and KVM virtualization platforms. It outlines the logical and physical architecture of OpenStack, including the roles of key components like Nova, Swift, Glance, Cinder, Neutron and Keystone. It then compares the architectures of KVM and VMware and analyzes some advantages of KVM like lower costs. Finally, it presents the physical architecture and deployment of an OpenStack system.
This document provides an overview of OpenStack, including its history and key components. OpenStack is an open-source cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. It is used by enterprises to automate resource allocation and enable self-service provisioning through web interfaces for administrators and users.
Mirantis is a leading provider of OpenStack solutions, emphasizing ease of deployment, flexibility, and reliability through its robust support and integration with key technologies. The company has partnered with notable organizations like Cisco and Huawei to enhance cloud service offerings and streamline operations. Additionally, Mirantis offers extensive training in OpenStack, with a proven curriculum that has successfully prepared thousands of students for cloud management.
The document discusses SSL (Secure Sockets Layer) and TLS (Transport Layer Security) concepts, emphasizing the importance of encrypting traffic, managing certificates, and establishing trust via certificate authorities. It outlines processes for creating key pairs, enabling SSL for various Oracle components, and best practices for application developers in terms of configuration. Additionally, it provides detailed instructions on managing keystores and certificates using tools like keytool and orapki.
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshMobarak Hossain
This document provides an overview of an OpenStack training organized by Mobarak Hossain. It includes details about Mobarak Hossain's background and experience working for various companies in software and telecom. It also provides a brief history of cloud computing and OpenStack, describing some of the major OpenStack services and concepts. The document concludes with information about hands-on sessions for installing and using OpenStack.
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...DevDay Da Nang
The document discusses OpenStack, an open-source cloud operating system that originated at NASA, which enables resource management and automation in cloud computing. It highlights the challenge of managing virtual machines and the emerging need for a cloud management layer, emphasizing the benefits of a common platform for cloud federation and seamless interoperation among different cloud providers. Additionally, it outlines key components and projects within OpenStack and provides resources for further exploration and deployment of the platform.
The document provides a detailed overview of the OpenStack architecture and the VM provisioning request flow. It explains the complex interaction between various OpenStack components such as Nova, Keystone, Neutron, and Horizon, outlining each step from initiating a VM provisioning request to processing and validating it. Key components like identity management, scheduler functionality, and service catalog are also described, emphasizing the critical role of the Nova API and message queues in the provisioning process.
Oracle has joined Kubernetes to allow applications and infrastructure to be deployed as containers across virtual machines and servers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. Oracle supports Kubernetes in various ways including certifying WebLogic and Docker, providing an Oracle Kubernetes Engine (OKE) service on Oracle Cloud Infrastructure (OCI), and developing tools like the WebLogic Kubernetes Operator.
Quick overview of Openstack architectureToni Ramirez
The document provides an overview of OpenStack, including:
- OpenStack is an open source cloud computing platform consisting of interrelated components that provide infrastructure as a service.
- The major components are Nova (compute), Glance (image), Swift (object storage), Cinder (block storage), Quantum (networking), Keystone (identity), and Horizon (dashboard).
- Each component has multiple sub-components that work together to provide services like compute, storage, networking, and identity/access management.
Open stack architecture overview-meetup-6-6_2013Mirantis
This document provides an overview of OpenStack architecture and components. It discusses the goals of OpenStack, including understanding its purpose, ecosystem, definition, history, and projects. It describes the logical architecture and components of OpenStack like Nova, Glance, Swift, Cinder, Quantum, Keystone, and Horizon. It explains how a virtual machine provisioning request flows through different OpenStack components.
OpenStack is an open source cloud computing platform that allows users to build private and public clouds. It provides infrastructure as a service (IaaS) and allows users to provision compute, storage, and networking resources on demand in a self-service manner. The document discusses the history and components of OpenStack, including Nova (compute), Swift (object storage), Cinder (block storage), Keystone (identity), Glance (image service), and others. It also covers OpenStack deployment models, supported hypervisors and images, and how to easily install OpenStack using PackStack.
CIS 2015- Building IAM for OpenStack- Steve MartinelliCloudIDSummit
The document discusses identity and access management (IAM) in OpenStack, focusing on the Keystone service. It provides an overview of Keystone and describes how it handles authentication, authorization, and identity management. It also discusses the different identity sources that Keystone supports, such as SQL, LDAP, and multiple backends. Authentication methods covered include password, token, and federated identity. Large scale deployments of Keystone are also described.
This document provides an overview of a training course on using the OpenStack cloud computing platform. The course covers topics such as virtualization, OpenStack architecture, installation and configuration of key OpenStack services like Nova, Glance, Neutron, and Horizon. It is divided into 18 modules that teach concepts like the OpenStack infrastructure, deployment architectures, configuration of database, message broker and identity services, and hands-on use of the Horizon dashboard to launch instances. The course aims to help students implement both Red Hat OpenStack and self-deployed OpenStack platforms.
Apache Knox is a reverse proxy and gateway for Hadoop clusters that provides proxying, authentication, and authorization services. It simplifies access to Hadoop resources by encapsulating Kerberos authentication and providing a single access point. Knox also enables centralized control, auditing, and integration with enterprise identity systems. It protects against several common web security vulnerabilities and threats.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
This document provides an in-depth exploration of keystone token formats in OpenStack, detailing UUID, PKI, PKIZ, and Fernet formats, including their generation and validation workflows. Each section outlines the configuration settings, pros and cons, and specific examples of token usage and attributes. The document aims to guide users in selecting the appropriate token format based on their deployment requirements.
Openstack architecture for the enterprise (Openstack Ireland Meet-up)Keith Tobin
Synchronous
Replication
This document discusses OpenStack architecture for the enterprise. It describes using Crowbar to easily deploy OpenStack on Dell servers and networking equipment. Key aspects covered include using RabbitMQ clusters with mirrored queues for high availability, deploying Neutron on separate networking nodes, and using a Percona MySQL cluster to provide synchronous replication, data consistency, parallel applying and atomic node provisioning. The goal is an OpenStack architecture that is highly available, reliable, and can recover automatically from faults.
OpenStack is a cloud operating system that manages compute, storage, and networking resources in data centers through a user-friendly dashboard. Created in 2010 by Rackspace and NASA, it offers benefits like scalability, security, and open-source collaboration, while providing core services such as Nova for compute, Cinder for storage, and Neutron for networking. The architecture includes components like Keystone for authentication and Horizon for the user interface, making it a robust solution for cloud management.
Architecture Openstack for the EnterpriseKeith Tobin
1) The document discusses Dell's OpenStack architecture for enterprises, with Keith Tobin and Greg Jacobs presenting on their experience with OpenStack and Dell solutions.
2) It outlines the design goals of meeting enterprise performance expectations while providing high availability, reliability, and automatic recovery from failures.
3) The solution stack presented includes Dell servers, networking, and storage as well as OpenStack, SUSE Linux, Crowbar, Neutron, Ceph, RabbitMQ, and Percona for deployment, networking, storage, messaging, and database services.
The document provides information about installing and configuring OpenStack including:
1) It describes the hardware, software and networking requirements for the control and compute nodes when installing OpenStack.
2) It explains the different deployment options for OpenStack including all-in-one, multiple control and compute nodes, and different options for separating services.
3) It provides steps for installing OpenStack using Packstack, including generating SSH keys, editing the answer file and starting the deployment.
4) It gives an overview of the message broker services used by OpenStack and describes how to configure RabbitMQ or Qpid as the message broker.
This document provides an introduction to OpenStack, including:
- What OpenStack is and its key architectural components like Nova, Swift, Glance, Neutron, Cinder, and Horizon.
- OpenStack's upstream development process and largest contributors.
- Red Hat's involvement in OpenStack including the RDO community distribution and Red Hat Enterprise Linux OpenStack Platform.
- Examples of OpenStack deployments at large scale like CERN and its use cases for both traditional and cloud native workloads.
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Stephen Gordon
The document provides a comprehensive overview of OpenStack architecture and components, focusing on the compute services managed by Nova. It discusses instance lifecycle, scaling options, and the segregation of compute resources, emphasizing best practices and new features. Additionally, it outlines the integration with Red Hat Enterprise Linux and support for various drivers, presenting a detailed technical guide for managing cloud infrastructure.
The document discusses best practices for deploying a secure Keystone in OpenStack, highlighting the critical nature of Keystone security in managing access to cloud services. It covers risks such as credential theft and insecure file permissions, along with mitigation strategies, including secure communication, restricting file access, and managing admin privileges. Key vulnerabilities identified include denial of service attacks and leaking sensitive information, which can be addressed through configuration changes and upgrades.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Oracle Berkeley DB is Oracle's open source, embeddable database designed for devices, appliances and applications. It provides low latency and high throughput storage with reliability and scalability. Berkeley DB 11gR2 offers the performance and features of a key-value store with the transactional capabilities of SQLite in a small footprint package requiring no administration. Customers across various industries have adopted Berkeley DB for its benefits over flat files such as better performance, reliability and reduced development costs.
Mirantis is a leading provider of OpenStack solutions, emphasizing ease of deployment, flexibility, and reliability through its robust support and integration with key technologies. The company has partnered with notable organizations like Cisco and Huawei to enhance cloud service offerings and streamline operations. Additionally, Mirantis offers extensive training in OpenStack, with a proven curriculum that has successfully prepared thousands of students for cloud management.
The document discusses SSL (Secure Sockets Layer) and TLS (Transport Layer Security) concepts, emphasizing the importance of encrypting traffic, managing certificates, and establishing trust via certificate authorities. It outlines processes for creating key pairs, enabling SSL for various Oracle components, and best practices for application developers in terms of configuration. Additionally, it provides detailed instructions on managing keystores and certificates using tools like keytool and orapki.
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshMobarak Hossain
This document provides an overview of an OpenStack training organized by Mobarak Hossain. It includes details about Mobarak Hossain's background and experience working for various companies in software and telecom. It also provides a brief history of cloud computing and OpenStack, describing some of the major OpenStack services and concepts. The document concludes with information about hands-on sessions for installing and using OpenStack.
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...DevDay Da Nang
The document discusses OpenStack, an open-source cloud operating system that originated at NASA, which enables resource management and automation in cloud computing. It highlights the challenge of managing virtual machines and the emerging need for a cloud management layer, emphasizing the benefits of a common platform for cloud federation and seamless interoperation among different cloud providers. Additionally, it outlines key components and projects within OpenStack and provides resources for further exploration and deployment of the platform.
The document provides a detailed overview of the OpenStack architecture and the VM provisioning request flow. It explains the complex interaction between various OpenStack components such as Nova, Keystone, Neutron, and Horizon, outlining each step from initiating a VM provisioning request to processing and validating it. Key components like identity management, scheduler functionality, and service catalog are also described, emphasizing the critical role of the Nova API and message queues in the provisioning process.
Oracle has joined Kubernetes to allow applications and infrastructure to be deployed as containers across virtual machines and servers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. Oracle supports Kubernetes in various ways including certifying WebLogic and Docker, providing an Oracle Kubernetes Engine (OKE) service on Oracle Cloud Infrastructure (OCI), and developing tools like the WebLogic Kubernetes Operator.
Quick overview of Openstack architectureToni Ramirez
The document provides an overview of OpenStack, including:
- OpenStack is an open source cloud computing platform consisting of interrelated components that provide infrastructure as a service.
- The major components are Nova (compute), Glance (image), Swift (object storage), Cinder (block storage), Quantum (networking), Keystone (identity), and Horizon (dashboard).
- Each component has multiple sub-components that work together to provide services like compute, storage, networking, and identity/access management.
Open stack architecture overview-meetup-6-6_2013Mirantis
This document provides an overview of OpenStack architecture and components. It discusses the goals of OpenStack, including understanding its purpose, ecosystem, definition, history, and projects. It describes the logical architecture and components of OpenStack like Nova, Glance, Swift, Cinder, Quantum, Keystone, and Horizon. It explains how a virtual machine provisioning request flows through different OpenStack components.
OpenStack is an open source cloud computing platform that allows users to build private and public clouds. It provides infrastructure as a service (IaaS) and allows users to provision compute, storage, and networking resources on demand in a self-service manner. The document discusses the history and components of OpenStack, including Nova (compute), Swift (object storage), Cinder (block storage), Keystone (identity), Glance (image service), and others. It also covers OpenStack deployment models, supported hypervisors and images, and how to easily install OpenStack using PackStack.
CIS 2015- Building IAM for OpenStack- Steve MartinelliCloudIDSummit
The document discusses identity and access management (IAM) in OpenStack, focusing on the Keystone service. It provides an overview of Keystone and describes how it handles authentication, authorization, and identity management. It also discusses the different identity sources that Keystone supports, such as SQL, LDAP, and multiple backends. Authentication methods covered include password, token, and federated identity. Large scale deployments of Keystone are also described.
This document provides an overview of a training course on using the OpenStack cloud computing platform. The course covers topics such as virtualization, OpenStack architecture, installation and configuration of key OpenStack services like Nova, Glance, Neutron, and Horizon. It is divided into 18 modules that teach concepts like the OpenStack infrastructure, deployment architectures, configuration of database, message broker and identity services, and hands-on use of the Horizon dashboard to launch instances. The course aims to help students implement both Red Hat OpenStack and self-deployed OpenStack platforms.
Apache Knox is a reverse proxy and gateway for Hadoop clusters that provides proxying, authentication, and authorization services. It simplifies access to Hadoop resources by encapsulating Kerberos authentication and providing a single access point. Knox also enables centralized control, auditing, and integration with enterprise identity systems. It protects against several common web security vulnerabilities and threats.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
This document provides an in-depth exploration of keystone token formats in OpenStack, detailing UUID, PKI, PKIZ, and Fernet formats, including their generation and validation workflows. Each section outlines the configuration settings, pros and cons, and specific examples of token usage and attributes. The document aims to guide users in selecting the appropriate token format based on their deployment requirements.
Openstack architecture for the enterprise (Openstack Ireland Meet-up)Keith Tobin
Synchronous
Replication
This document discusses OpenStack architecture for the enterprise. It describes using Crowbar to easily deploy OpenStack on Dell servers and networking equipment. Key aspects covered include using RabbitMQ clusters with mirrored queues for high availability, deploying Neutron on separate networking nodes, and using a Percona MySQL cluster to provide synchronous replication, data consistency, parallel applying and atomic node provisioning. The goal is an OpenStack architecture that is highly available, reliable, and can recover automatically from faults.
OpenStack is a cloud operating system that manages compute, storage, and networking resources in data centers through a user-friendly dashboard. Created in 2010 by Rackspace and NASA, it offers benefits like scalability, security, and open-source collaboration, while providing core services such as Nova for compute, Cinder for storage, and Neutron for networking. The architecture includes components like Keystone for authentication and Horizon for the user interface, making it a robust solution for cloud management.
Architecture Openstack for the EnterpriseKeith Tobin
1) The document discusses Dell's OpenStack architecture for enterprises, with Keith Tobin and Greg Jacobs presenting on their experience with OpenStack and Dell solutions.
2) It outlines the design goals of meeting enterprise performance expectations while providing high availability, reliability, and automatic recovery from failures.
3) The solution stack presented includes Dell servers, networking, and storage as well as OpenStack, SUSE Linux, Crowbar, Neutron, Ceph, RabbitMQ, and Percona for deployment, networking, storage, messaging, and database services.
The document provides information about installing and configuring OpenStack including:
1) It describes the hardware, software and networking requirements for the control and compute nodes when installing OpenStack.
2) It explains the different deployment options for OpenStack including all-in-one, multiple control and compute nodes, and different options for separating services.
3) It provides steps for installing OpenStack using Packstack, including generating SSH keys, editing the answer file and starting the deployment.
4) It gives an overview of the message broker services used by OpenStack and describes how to configure RabbitMQ or Qpid as the message broker.
This document provides an introduction to OpenStack, including:
- What OpenStack is and its key architectural components like Nova, Swift, Glance, Neutron, Cinder, and Horizon.
- OpenStack's upstream development process and largest contributors.
- Red Hat's involvement in OpenStack including the RDO community distribution and Red Hat Enterprise Linux OpenStack Platform.
- Examples of OpenStack deployments at large scale like CERN and its use cases for both traditional and cloud native workloads.
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Stephen Gordon
The document provides a comprehensive overview of OpenStack architecture and components, focusing on the compute services managed by Nova. It discusses instance lifecycle, scaling options, and the segregation of compute resources, emphasizing best practices and new features. Additionally, it outlines the integration with Red Hat Enterprise Linux and support for various drivers, presenting a detailed technical guide for managing cloud infrastructure.
The document discusses best practices for deploying a secure Keystone in OpenStack, highlighting the critical nature of Keystone security in managing access to cloud services. It covers risks such as credential theft and insecure file permissions, along with mitigation strategies, including secure communication, restricting file access, and managing admin privileges. Key vulnerabilities identified include denial of service attacks and leaking sensitive information, which can be addressed through configuration changes and upgrades.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Oracle Berkeley DB is Oracle's open source, embeddable database designed for devices, appliances and applications. It provides low latency and high throughput storage with reliability and scalability. Berkeley DB 11gR2 offers the performance and features of a key-value store with the transactional capabilities of SQLite in a small footprint package requiring no administration. Customers across various industries have adopted Berkeley DB for its benefits over flat files such as better performance, reliability and reduced development costs.
The document outlines the features and capabilities of Oracle's SPARC M7 processors, highlighting their security enhancements, such as silicon secured memory and hardware crypto acceleration. It presents benchmark results and comparisons with other processor architectures, indicating significant performance advantages in various metrics. Additionally, it emphasizes the importance of these advancements for enterprise applications and cloud computing environments.
Auditing security of Oracle DB (Karel Miko)DCIT, a.s.
The document discusses auditing security of Oracle databases. It divides the audit into four technical phases:
1) Auditing the operating system level, including checking permissions on the Oracle home directory and verifying the OS account used for Oracle has appropriate privileges.
2) Auditing the Oracle RDBMS level, including validating the Oracle version and installed patches.
3) Auditing Oracle database instances, including verifying database options and privileges granted to users and roles.
4) Auditing related processes, such as the Oracle listener and associated configuration files.
Das Dokument behandelt die neuen Funktionen im SQL Tuning der Oracle DB 12c, insbesondere in den Versionen 12.1.0.1 und 12.1.0.2, und thematisiert adaptive Query-Optimierung sowie automatische Reoptimierung. Es werden neue Typen von Histogrammen und die Speicherung von Ausführungsstatistiken als SQL-Plan-Direktive besprochen. Zudem wird auf die Erhöhung der Effizienz des Optimizers durch 'dynamic statistics' hingewiesen.
Oracle SQL Performance Tuning and Optimization v26 chapter 1Kevin Meade
The document is a book about Oracle SQL performance tuning and optimization. It discusses foundational concepts for writing efficient SQL queries such as data modeling best practices, indexing strategies, and query tuning techniques. Specific topics covered include the filtered rows percentage method for determining join order, ways to use a query execution plan, creating indexes that optimize query performance, join types and hints to influence the query optimizer. The book provides examples and scripts to help readers understand and apply the concepts.
This document discusses Oracle database performance tuning. It covers identifying common Oracle performance issues such as CPU bottlenecks, memory issues, and inefficient SQL statements. It also outlines the Oracle performance tuning method and tools like the Automatic Database Diagnostic Monitor (ADDM) and performance page in Oracle Enterprise Manager. These tools help administrators monitor performance, identify bottlenecks, implement ADDM recommendations, and tune SQL statements reactively when issues arise.
The document provides instructions for attending an Oracle Support Advisor Webcast on troubleshooting issues with TCPS configuration and communication on databases, including how to access the recording and ask questions. It lists two options for attending - listening through computer audio or calling in by phone. It also provides the webinar ID and dial-in details needed to join the teleconference.
TLS (Transport Layer Security) is a protocol that provides secure communication over the Internet by addressing issues of privacy, integrity, and authentication. It uses encryption to ensure privacy, message authentication codes to ensure integrity, and X.509 certificates to perform authentication between clients and servers. TLS is commonly used with HTTPS to secure web browsing and can also be used by other applications like email, voice over IP, and file transfer.
WebLogic in Practice: SSL ConfigurationSimon Haslam
The document provides an overview of SSL configuration in Oracle WebLogic Server. It discusses key SSL concepts like key pairs, certificates, and certificate authorities. It describes how WebLogic uses Java keystores for identity and trust, and the tools like keytool and orapki that can be used to manage keys and certificates. The document also covers best practices for SSL configuration in WebLogic like always enabling hostname verification and not using demo certificates in production.
This document discusses SSL certificates, including their purpose for server/client authentication and secure data transfer. It covers the process of requesting, signing, installing and verifying certificates from both Certificate Authorities (CAs) and self-signing. The different types of SSL certificates - DV, OV and EV - are explained along with OpenSSL tools, certificate structure, chain of trust, trust stores, certificate pinning and free certificate options like Let's Encrypt.
All you need to know about transport layer securityMaarten Smeets
The document provides a comprehensive overview of Transport Layer Security (TLS), highlighting its importance for ensuring confidentiality, integrity, authentication, and authorization in data exchange. It also discusses the role of TLS in the context of GDPR compliance, various security layers, and the specific implementations in Oracle products. Key concepts such as cipher suites, certificates, and the differences between one-way and two-way SSL are covered, along with practical considerations for managing TLS within cloud services.
This document provides an overview of SSL (Secure Sockets Layer) technology, including why it is used, how it works, and common troubleshooting tips. SSL addresses issues with communicating securely over the internet such as verifying identities, preventing eavesdropping, and modifying data. It uses public key cryptography where each party has a public and private key to encrypt data. The SSL handshake process negotiates encryption between client and server before transmitting encrypted data. Common SSL issues involve certificate validation errors, which can be debugged using stack traces and tools like Keytool and OpenSSL.
Webservice security considerations and measuresMaarten Smeets
The document discusses various aspects of web service security, focusing on the implications of GDPR and the need for encryption and confidentiality. It covers security protocols like TLS/SSL, authentication methods, and considerations for implementation within Oracle products and the cloud. The text also highlights the importance of managing personally identifiable information and provides guidelines for compliance and effective security measures.
The document outlines essential information about SSL (Secure Sockets Layer) and TLS (Transport Layer Security), including their definitions, purposes, protocols, and current versions. It explains the necessity of SSL certificates for securing website connections and details the SSL handshake process. Additionally, it touches on SSL support in MySQL, enabling SSL on MySQL servers, and offers various services including coding help.
The document discusses significant research on Oracle security issues, particularly in enterprise user security and SSL configuration, as well as streams replication in Oracle 10.2g. It outlines how to configure Oracle's advanced security to manage user roles and secure authentication, highlighting steps for SSL setup and enterprise user security configuration. Additionally, it provides a summary of related documents and the necessary environment for effective implementation.
This document provides an overview of SSL/TLS (Secure Sockets Layer/Transport Layer Security) and how it works to secure data transmission over the internet. It discusses why SSL is important for encrypting data and verifying identities. It then explains the basic process of how SSL works, including how a client encrypts requests using a server's public key and how the server decrypts with its private key. The document outlines the requirements to implement SSL, including generating a key and obtaining a certificate. It differentiates between self-signed and authorized certificates. Finally, it provides steps to create a certificate using OpenSSL and configure the Apache web server to use SSL.
The document discusses the Secure Sockets Layer (SSL) technology, detailing its importance for establishing encrypted links between web servers and browsers. It explains the SSL protocol phases, working mechanisms, and the evolution of SSL versions leading to the Transport Layer Security (TLS). Additionally, it addresses various encryption algorithms and the significance of certification authorities for secure online communication.
The document outlines the process of securing data in motion using TLS and SSL for DB2 database connections, covering the configuration of server and client side encryption, including the creation of keyrings and certificates. It discusses essential elements such as troubleshooting configurations, the importance of current encryption standards, and updates for software like IBM Global Security Kit (GSKIT). The document also details specific command-line instructions for setting up secure connections for various client types and scenarios.
The document discusses secure PostgreSQL deployments, focusing on various security measures such as authentication methods, connection security, and data encryption. Key topics include the use of pg_hba.conf for authentication configuration, various authentication methods like LDAP and Kerberos, and the importance of SSL for secure connections and data protection. The document emphasizes best practices and potential threats in securing PostgreSQL databases.
This document discusses managing SSL in Rocket MV products. It covers SSL vulnerabilities like Heartbleed and POODLE. It discusses industry trends moving away from SHA1 and disabling SSLv3. It outlines how UniData, UniVerse, and U2 clients support SSL, including managing certificates and security context records. It provides configuration options to strengthen SSL security.
Certificate pinning in android applicationsArash Ramez
Certificate pinning is a security mechanism where an app specifies certificates from trusted authorities and only accepts connections signed by those certificates. This prevents man-in-the-middle attacks. The document discusses implementing certificate pinning in Android apps by configuring the network security configuration file or using third party libraries like OkHttp that have CertificatePinner classes to restrict which certificates an app will accept. It also describes how to retrieve a server's public key hashes to include in the pinning configuration.
Training Slides: 302 - Securing Your Cluster With SSLContinuent
This document discusses securing a Tungsten cluster with SSL. It explains what SSL is and why it is used. It then covers deploying SSL for cluster communications and for the Tungsten connector. For the cluster, SSL is enabled in tungsten.ini and certificates are generated and distributed. For the connector in proxy mode, MySQL certificates must be imported into keystores and SSL configured from the connector to the database. SSL can also be configured from the application to the connector. Successful SSL encryption is verified using tcpdump and checking the Tungsten connection status. The next steps will cover the Tungsten dashboard.
SSL Implementation - IBM MQ - Secure Communications nishchal29
The document provides an overview of MQ security fundamentals, focusing on cryptography, digital certificates, and the Public Key Infrastructure (PKI). It details the roles of SSL/TLS in securing communications and describes the processes for mutual authentication between queue managers using self-signed and CA-signed certificates. Additionally, it outlines the management of digital certificates, including renewal procedures and common errors encountered in SSL connections.
Configuring Outbound SSL connection to invoke secured RESTPradeep Mishra
This document outlines the steps to configure an Oracle SOA 12c environment to invoke SSL-secured REST/SOAP web services. It describes verifying the keystore configuration in WebLogic Server, importing SSL certificates into the Oracle keystore, and concluding that following these steps will allow the SOA environment to make SSL calls to exposed web services.
Uploading certificate with oracle wallet manager and orapki utilitiesÖzgür Umut Vurgun
This document provides step-by-step instructions for uploading SSL certificates to an Oracle wallet using Oracle Wallet Manager (OWM) and orapki utilities. It explains how to create and manage wallets, import certificates, define access control lists (ACLs) to grant users access to web services, and call web services securely using UTL_HTTP and stored procedures. The goal is to help database administrators connect to web services over HTTPS and retrieve data from Oracle databases.
OSCM 2024 | Ignite: Monitoring and maintaining self-signed certificates is da...NETWAYS
The document outlines how to quickly set up a proper internal Certificate Authority (CA) in five minutes, emphasizing the need for security over self-signed certificates. It provides step-by-step instructions for creating root and intermediate certificates, and issuing server certificates, while also cautioning against the use of a certificate revocation list for simplicity. The overall goal is to enable secure SSL services with monitoring capabilities while avoiding the vulnerabilities of self-signed certificates.
The document outlines challenges and solutions related to data integration and management within Oracle Cloud ERP, including the use of various tools like Oracle SOA Cloud Service and Oracle Data Integrator. It discusses issues encountered during data uploads and extractions, such as service availability errors, data processing limitations, and the necessity of effective data management strategies. Additionally, it emphasizes the importance of understanding Oracle's cloud services and the technical needs for successful implementation.
Maksims Greckis, an Oracle expert with 8 years of experience, discusses various aspects of DBA outsourcing and remote consulting, along with Oracle training and hardware. He provides specific guidance on managing logs, including setting up auto-purge and executing commands for log management. Additionally, he notes issues with ADRCI performance following version upgrades and advises manual purging of logs before scheduling cleanup.
Aleksejs Nemirovskis - Manage your data using oracle BDAAndrejs Vorobjovs
The document provides an overview of the Oracle Big Data Appliance (BDA), detailing its architecture, components, hardware, and software specifications. It highlights the advantages of using Oracle BDA, discusses challenges within the ecosystem, and presents a customer case study. Additionally, it covers infrastructure setup and data processing strategies utilizing various Oracle and Cloudera technologies.
The document outlines the agenda for the LVoug Meetup #18 held on January 3, 2019, in Riga, featuring several speakers from Accenture and a coffee break. It also mentions upcoming events such as the ILoug Tech Days and the OUgn Spring Conference, along with links to resources and contact information for the LVoug group. The document highlights the importance of tech conferences in the Baltic states focusing on various technologies.
The document outlines the agenda for the LVoug Meetup #17 held on November 16, 2017, in Riga, featuring various speakers and workshops related to Oracle user groups and technologies. It also includes information about upcoming conferences and training sessions, including Oracle trainings and the Rigadev Days tech conference in May 2018. Contact details and links to social media and resources for the LVoug community are provided.
Aleksandrs Asafovs provides an extensive overview of MySQL backup strategies, including various methods for full and incremental backups using tools like mysqldump, Percona XtraBackup, and MySQL Enterprise Backup. The document details specific commands and procedures for creating backups, restoring databases, and performing point-in-time recovery, along with filesystem snapshot techniques using Logical Volume Manager (LVM). It addresses performance comparisons of different backup methods and outlines relevant user permissions for backup operations.
LVoug Meetup #16 took place on November 7, 2016, in Riga, featuring updates on the Oracle user group and speakers from Lattelecom and DBACC. The event included networking opportunities and announcements about future conferences such as the Oracle User Group Technology Conference in Birmingham. Attendees were encouraged to participate in the DBA Competence Challenge and other upcoming events.
Middleware upgrade to Oracle Fusion Middleware(FMW) 12c.Real Case stories. Andrejs Vorobjovs
The document outlines the organization and challenges faced during the upgrade of Oracle products to version 12c, specifically focusing on middleware and report servers. It details upgrade strategies, issues with documentation, configuration discrepancies, and the importance of testing and preparation in the DBA's role. The case studies provide insights into real-life upgrades, showcasing the complexities and risks inherent in such projects.
The document outlines the top 15 MySQL parameters that beginners should be aware of, covering configuration, backup, memory allocation, security, and performance optimization. Key topics include proper configuration file selection, avoiding duplicate parameters, and various backup strategies using tools like mysqldump and Percona XtraBackup. Additional focus is given to security measures and the importance of performance schema in managing MySQL databases.
Izmantojiet iespēju piedalīties plašākajā IT nozares konferencē Baltijā Riga Dev Day 2016, kas jau otro gadu no 2. līdz 4. martam norisināsies Rīgā.
Ko iegūsiet?
Praktiski pielietojamu informāciju par IT nozares aktuālākajām un jaunākajām tēmām – mobilo ierīču aplikāciju izstrādi, Java/JVM, JavaScript jaununiem, Oracle datu bāzes risinājumiem un modernākajām tehnoloģijām.
The document outlines the agenda for the LVOUG meetup #15 on January 21, 2016 in Riga. The agenda includes an update on Oracle User group news at 16:00, followed by presentations from Aleksandrs Asafovs of Lattelecom at 16:10 and Andrey Chervonets of SIA CoMinder at 17:15. There is also information provided on the upcoming Riga Dev Day conference from March 2-4, 2016 focusing on software development, as well as contact details for the LVOUG group.
Компания Accenture Latvia выступила партнером первого семинара на русском языке, организованного Latvian Oracle User Group, который прошел в трех городах: Москве, Душанбе и Риге в ноябре 2015 года. Семинар 'OTN Tour 2015' собрал более 60 участников из технической сферы и включал выступления международных экспертов по базам данных Oracle и облачным технологиям, а также дискуссионную сессию. Мероприятие повысило уровень знаний среди молодежи и специалистов, включая представителей различных отраслей и студентов.
The document appears to be a collection of quotes and reflections from a long distance run. It includes brief quotes attributed to Stephen Covey about beginning with the end in mind, and W.H. Murray's quote about how committing to a course of action allows providence to move in one's favor. The reflections discuss believing in oneself, deciding to act, not being afraid, the time it took to complete the run, and finding inspiration in helping others.
OTN tour 2015 benchmarking oracle io performance with Orion by Alex GorbachevAndrejs Vorobjovs
The document discusses benchmarking Oracle I/O performance using Orion, a tool designed for stress testing the I/O subsystem similar to database patterns. It outlines techniques for controlling Orion's workload patterns and analyzing performance metrics, emphasizing the importance of proper infrastructure tuning. Pythian, a data outsourcing and consulting company, is highlighted for its expertise in optimizing critical data systems.
OTN tour 2015 Oracle Enterprise Manager 12c – Proof of ConceptAndrejs Vorobjovs
The document provides a proof of concept for the Oracle Enterprise Manager 12c, highlighting the experiences and specializations of presenters from Accenture. It covers topics such as database and middleware provisioning, as well as challenges faced with existing solutions. The agenda includes discussions on various Oracle products and concludes with a Q&A session.
The document outlines five key characteristics of cloud infrastructure, including on-demand self-service and broad network access. It also describes three cloud service models: SaaS, PaaS, and IaaS, detailing their functions and examples. Additionally, the document hints at emerging trends and opportunities within the cloud computing sector.
The document discusses the use of Automatic Workload Repository (AWR) data in troubleshooting Oracle database performance issues, highlighting both its advantages and limitations. It provides examples of when AWR is a good choice for performance mining and when alternative methods, like SQL trace, would be more effective. Detailed SQL queries and statistics are presented to illustrate how to identify high resource-consuming SQLs and analyze performance trends.
This document summarizes an OTN TOUR 2015 event held on November 27th in Riga. The agenda included welcome and introductory remarks followed by 5 sessions on topics like AWR DB performance data mining, benchmarking Oracle database I/O performance, OEM 12c, implementing SSL between Oracle DB and clients, and cloud for Oracle databases. It also provided information on an upcoming UKOUG conference in Birmingham and the Riga Dev Day conference in March 2016 with speaker details. Contact information was given for the LVOUG user group.
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]SHERAZ AHMAD LONE
This study material for Class 10th covers the core subjects of Economics, Disaster Management, and Road Safety Education, developed strictly in line with the JKBOSE textbook. It presents the content in a simplified, structured, and student-friendly format, ensuring clarity in concepts. The material includes reframed explanations, flowcharts, infographics, and key point summaries to support better understanding and retention. Designed for classroom teaching and exam preparation, it aims to enhance comprehension, critical thinking, and practical awareness among students.
Code Profiling in Odoo 18 - Odoo 18 SlidesCeline George
Profiling in Odoo identifies slow code and resource-heavy processes, ensuring better system performance. Odoo code profiling detects bottlenecks in custom modules, making it easier to improve speed and scalability.
Environmental Science, Environmental Health, and Sanitation – Unit 3 | B.Sc N...RAKESH SAJJAN
This PowerPoint presentation covers Unit 3 – Environmental Science, Environmental Health, and Sanitation from the 5th Semester B.Sc Nursing syllabus prescribed by the Indian Nursing Council (INC). It is carefully designed to support nursing students, educators, and community health professionals in understanding the environmental components that influence health and disease prevention.
The unit emphasizes the interrelationship between the environment and human health, highlighting various environmental factors, hazards, and strategies for disease prevention through sanitation and public health initiatives.
✳️ Topics Covered in the PPT:
Definition and scope of environmental science and environmental health
Importance of a safe environment for public health
Types of environmental pollution – air, water, soil, noise, and radiation
Sources, effects, and prevention of different types of pollution
Concept of ecosystem and its components
Water safety and purification methods at household and community levels
Disposal of waste and excreta – types, methods, health risks
Introduction to environmental sanitation
Vector control measures: Mosquitoes, houseflies, rodents, etc.
Biological and non-biological health hazards in the environment
National programs related to environmental health and sanitation
Health education for safe water, hygiene, and sanitation behavior change
Role of a community health nurse in promoting environmental health
Use of community bags and home visit kits to educate rural families
Practical methods for solid waste management and waste segregation
This presentation supports:
Class lectures and revision
Health teaching in field visits
Community awareness campaigns
Internal assessments and final exam preparation
It ensures that all essential environmental health concepts are simplified and well-structured for easy understanding and application in nursing practice.
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...Rajdeep Bavaliya
Dive into a captivating analysis where Kazuo Ishiguro’s nuanced fiction meets the stark realities of post‑2014 Indian journalism. Uncover how “Godi Media” turned from watchdog to lapdog, echoing the moral compromises of Ishiguro’s protagonists. We’ll draw parallels between restrained narrative silences and sensationalist headlines—are our media heroes or traitors? Don’t forget to follow for more deep dives!
M.A. Sem - 2 | Presentation
Presentation Season - 2
Paper - 107: The Twentieth Century Literature: From World War II to the End of the Century
Submitted Date: April 4, 2025
Paper Name: The Twentieth Century Literature: From World War II to the End of the Century
Topic: From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi Media” in Post-2014 Indian Journalism
[Please copy the link and paste it into any web browser to access the content.]
Video Link: https://youtu.be/kIEqwzhHJ54
For a more in-depth discussion of this presentation, please visit the full blog post at the following link: https://rajdeepbavaliya2.blogspot.com/2025/04/from-watchdog-to-lapdog-ishiguro-s-fiction-and-the-rise-of-godi-media-in-post-2014-indian-journalism.html
Please visit this blog to explore additional presentations from this season:
Hashtags:
#GodiMedia #Ishiguro #MediaEthics #WatchdogVsLapdog #IndianJournalism #PressFreedom #LiteraryCritique #AnArtistOfTheFloatingWorld #MediaCapture #KazuoIshiguro
Keyword Tags:
Godi Media, Ishiguro fiction, post-2014 Indian journalism, media capture, Kazuo Ishiguro analysis, watchdog to lapdog, press freedom India, media ethics, literature and media, An Artist of the Floating World
Non-Communicable Diseases and National Health Programs – Unit 10 | B.Sc Nursi...RAKESH SAJJAN
This PowerPoint presentation is prepared for Unit 10 – Non-Communicable Diseases and National Health Programs, as per the 5th Semester B.Sc Nursing syllabus outlined by the Indian Nursing Council (INC) under the subject Community Health Nursing – I.
This unit focuses on equipping students with knowledge of the causes, prevention, and control of non-communicable diseases (NCDs), which are a major public health challenge in India. The presentation emphasizes the nurse’s role in early detection, screening, management, and referral services under national-level programs.
🔹 Key Topics Included:
Definition, burden, and impact of NCDs in India
Epidemiology, risk factors, signs/symptoms, prevention, and management of:
Diabetes Mellitus
Hypertension
Cardiovascular Diseases
Stroke & Obesity
Thyroid Disorders
Blindness
Deafness
Injuries and Accidents (incl. road traffic injuries and trauma guidelines)
NCD-2 Cancers:
Breast Cancer
Cervical Cancer
Oral Cancer
Risk factors, screening, diagnosis, early signs, referral & palliative care
Role of nurse in screening, referral, counseling, and continuum of care
National Programs:
National Program for Prevention and Control of Cancer, Diabetes, Cardiovascular Diseases and Stroke (NPCDCS)
National Program for Control of Blindness
National Program for Prevention and Control of Deafness
National Tobacco Control Program (NTCP)
Introduction to Universal Health Coverage and Ayushman Bharat
Use of standard treatment protocols and referral flowcharts
This presentation is ideal for:
Classroom lectures, field assignments, health education planning, and student projects
Preparing for university exams, class tests, and community field postings
Communicable Diseases and National Health Programs – Unit 9 | B.Sc Nursing 5t...RAKESH SAJJAN
This PowerPoint presentation covers Unit 9 – Communicable Diseases and National Health Programs, a core part of the 5th Semester B.Sc Nursing (Community Health Nursing – I) syllabus, as outlined by the Indian Nursing Council (INC).
This unit enables nursing students to understand the epidemiology, prevention, control, and nursing management of common communicable diseases in India, while also offering a structured overview of the National Health Programs implemented to address them.
The content is critical for effective field practice, disease surveillance, early detection, referral, and health education, equipping students to participate in public health interventions and outbreak control at community and national levels.
📘 Key Topics Covered in the PPT:
Definition and classification of communicable diseases
Modes of transmission and chain of infection
Common communicable diseases in India:
Malaria
Tuberculosis
Leprosy
Dengue
HIV/AIDS
Hepatitis
COVID-19 (if included in the current curriculum)
Diarrheal diseases
Acute Respiratory Infections (ARIs)
Epidemiological factors, causative agents, symptoms, and incubation periods
Prevention and control strategies: primary, secondary, and tertiary levels
Nursing responsibilities in patient care, contact tracing, community surveillance, and outbreak control
Health education and behavior change communication for community awareness
Vaccination schedules and cold chain maintenance
National Health Programs related to communicable diseases:
National Vector Borne Disease Control Program (NVBDCP)
Revised National Tuberculosis Control Program (RNTCP)
National Leprosy Eradication Program (NLEP)
National AIDS Control Program (NACP)
Universal Immunization Program (UIP)
IDSP – Integrated Disease Surveillance Program
Overview of standard treatment protocols, referral mechanisms, and community nurse’s role in program implementation
This presentation is ideal for:
Nursing students preparing for university exams, class tests, and field projects
Tutors teaching infectious disease nursing and public health interventions
Nurses involved in immunization, outbreak investigation, and contact tracing
It provides a student-friendly breakdown of concepts, aligned with national priorities, including flowcharts, tables, case examples, and simplified text for field-level application.
Health Care Planning and Organization of Health Care at Various Levels – Unit...RAKESH SAJJAN
This comprehensive PowerPoint presentation is prepared for B.Sc Nursing 5th Semester students and covers Unit 2 of Community Health Nursing – I based on the Indian Nursing Council (INC) syllabus. The unit focuses on the planning, structure, and functioning of health care services at various levels in India. It is especially useful for nursing educators and students preparing for university exams, internal assessments, or professional teaching assignments.
The content of this presentation includes:
Historical development of health planning in India
Detailed study of various health committees: Bhore, Mudaliar, Kartar Singh, Shrivastava Committee, etc.
Overview of major health commissions
In-depth understanding of Five-Year Plans and their impact on health care
Community participation and stakeholder involvement in health care planning
Structure of health care delivery system at central, state, district, and peripheral levels
Concepts and implementation of Primary Health Care (PHC) and Sustainable Development Goals (SDGs)
Introduction to Comprehensive Primary Health Care (CPHC) and Health and Wellness Centers (HWCs)
Expanded role of Mid-Level Health Providers (MLHPs) and Community Health Providers (CHPs)
Explanation of national health policies: NHP 1983, 2002, and 2017
Key national missions and schemes including:
National Health Mission (NHM)
National Rural Health Mission (NRHM)
National Urban Health Mission (NUHM)
Ayushman Bharat – Pradhan Mantri Jan Arogya Yojana (PM-JAY)
Universal Health Coverage (UHC) and India’s commitment to equitable health care
This presentation is ideal for:
Nursing students (B.Sc, GNM, Post Basic)
Nursing tutors and faculty
Health educators
Competitive exam aspirants in nursing and public health
It is organized in a clear, point-wise format with relevant terminologies and a focus on applied knowledge. The slides can also be used for community health demonstrations, teaching sessions, and revision guides.
This is complete for June 17th. For the weekend of Summer Solstice
June 20th-22nd.
6/17/25: “My now Grads, You’re doing well. I applaud your efforts to continue. We all are shifting to new paradigm realities. Its rough, there’s good and bad days/weeks. However, Reiki with Yoga assistance, does work.”
6/18/25: "For those planning the Training Program Do Welcome. Happy Summer 2k25. You are not ignored and much appreciated. Our updates are ongoing and weekly since Spring. I Hope you Enjoy the Practitioner Grad Level. There's more to come. We will also be wrapping up Level One. So I can work on Levels 2 topics. Please see documents for any news updates. Also visit our websites. Every decade I release a Campus eMap. I will work on that for summer 25. We have 2 old libraries online thats open. https://ldmchapels.weebly.com "
Our Monthly Class Roster is 7,141 for 6/21.
ALL students get privacy naturally. Thx Everyone.
As a Guest Student,
You are now upgraded to Grad Level.
See Uploads for “Student Checkins” & “S9”. Thx.
Happy Summer 25.
These are also timeless.
Thank you for attending our workshops.
If you are new, do welcome.
For visual/Video style learning see our practitioner student status.
This is listed under our new training program. Updates ongoing levels 1-3 this summer. We just started Session 1 for level 1.
These are optional programs. I also would like to redo our library ebooks about Hatha and Money Yoga. THe Money Yoga was very much energy healing without the Reiki Method. An updated ebook/course will be done this year. These Projects are for *all fans, followers, teams, and Readers. TY for being presenting.
VCE Literature Section A Exam Response Guidejpinnuck
This practical guide shows students of Unit 3&4 VCE Literature how to write responses to Section A of the exam. Including a range of examples writing about different types of texts, this guide:
*Breaks down and explains what Q1 and Q2 tasks involve and expect
*Breaks down example responses for each question
*Explains and scaffolds students to write responses for each question
*Includes a comprehensive range of sentence starters and vocabulary for responding to each question
*Includes critical theory vocabulary lists to support Q2 responses
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...parmarjuli1412
OBSESSIVE COMPULSIVE DISORDER INCLUDED TOPICS ARE INTRODUCTION, DEFINITION OF OBSESSION, DEFINITION OF COMPULSION, MEANING OF OBSESSION AND COMPULSION, DEFINITION OF OBSESSIVE COMPULSIVE DISORDER, EPIDERMIOLOGY OF OCD, ETIOLOGICAL FACTORS OF OCD, CLINICAL SIGN AND SYMPTOMS OF OBSESSION AND COMPULSION, MANAGEMENT INCLUDED PHARMACOTHERAPY(ANTIDEPRESSANT DRUG+ANXIOLYTIC DRUGS), PSYCHOTHERAPY, NURSING MANAGEMENT(ASSESSMENT+DIAGNOSIS+NURSING INTERVENTION+EVALUATION))
Battle of Bookworms is a literature quiz organized by Pragya, UEM Kolkata, as part of their cultural fest Ecstasia. Curated by quizmasters Drisana Bhattacharyya, Argha Saha, and Aniket Adhikari, the quiz was a dynamic mix of classical literature, modern writing, mythology, regional texts, and experimental literary forms. It began with a 20-question prelim round where ‘star questions’ played a key tie-breaking role. The top 8 teams moved into advanced rounds, where they faced audio-visual challenges, pounce/bounce formats, immunity tokens, and theme-based risk-reward questions. From Orwell and Hemingway to Tagore and Sarala Das, the quiz traversed a global and Indian literary landscape. Unique rounds explored slipstream fiction, constrained writing, adaptations, and true crime literature. It included signature IDs, character identifications, and open-pounce selections. Questions were crafted to test contextual understanding, narrative knowledge, and authorial intent, making the quiz both intellectually rewarding and culturally rich. Battle of Bookworms proved literature quizzes can be insightful, creative, and deeply enjoyable for all.
Community Health Nursing Approaches, Concepts, Roles & Responsibilities – Uni...RAKESH SAJJAN
This PowerPoint presentation is based on Unit 6 – Community Health Nursing Approaches, Concepts, Roles & Responsibilities of Community Health Nursing Personnel, designed for B.Sc Nursing 5th Semester students under the subject Community Health Nursing – I, following the syllabus of the Indian Nursing Council (INC).
This unit focuses on the various approaches in community health, the organizational framework, and the responsibilities of different levels of nursing staff in the healthcare system. It emphasizes the real-world application of nursing principles to provide comprehensive and preventive care to the community.
📘 Key Areas Covered in this Presentation:
Introduction to the concept of community health nursing
Approaches to community health:
Nursing Process Approach
Epidemiological Approach
Evidence-Based Approach
Problem-Solving Approach
Nursing Theories in Community Health Practice
Explanation of teamwork and intersectoral coordination
Concept of primary health care and its application in community nursing
Levels of health care delivery – primary, secondary, and tertiary care
Home visit process: principles, planning, implementation, and follow-up
Use of community bag and record maintenance
Roles and responsibilities of:
Auxiliary Nurse Midwives (ANMs)
Community Health Officers (CHOs)
Staff Nurses
ASHA workers
Public Health Nurses (PHNs)
Documentation and reporting in community settings
Promotion of health education, immunization, maternal and child health, and nutritional support
Role of nurse in disease surveillance, outbreak control, and health promotion
Ethical principles in community nursing
Coordination with health team members and village health committees
This presentation is useful for:
Nursing students preparing for university theory exams, class tests, or viva
Nursing educators conducting lectures or field discussions
Interns and trainees working in PHCs, sub-centers, or community settings
Community nurses and health educators involved in rural and urban outreach
The content is simplified, clear, and enhanced with point-wise explanations, flowcharts, and field-related examples for better retention and application.
"Geography Study Material for Class 10th" provides a comprehensive and easy-to-understand resource for key topics like Resources & Development, Water Resources, Agriculture, Minerals & Energy, Manufacturing Industries, and Lifelines of the National Economy. Designed as per the latest NCERT/JKBOSE syllabus, it includes notes, maps, diagrams, and MODEL question Paper to help students excel in exams. Whether revising for exams or strengthening conceptual clarity, this material ensures effective learning and high scores. Perfect for last-minute revisions and structured study sessions.
How to Customize Quotation Layouts in Odoo 18Celine George
Customizing quotation layouts in Odoo 18 allows businesses to personalize their quotations to match branding or specific requirements. This can include adding logos, custom fields, or modifying headers and footers.
3. RAC Cluster
Project overview
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users / tools directly
connecting to DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener
4. How does SSL/TLS work?
How does SSL/TLS work? from http://security.stackexchange.com/ => here
How does SSL work? What is an SSL handshake? from http://www.symantec.com/ => here
Transport Layer Security from https://en.wikipedia.org/ => here
5. SSL session overview (1 way)
ServerInitial request (to https://domainname.com)
Hello .... SSLv2, SSLv3, TLSv1, .... ciphers, hash function
● Server Certificate
● Server Private Key
Server Certificate (signed by Certificate Authority)
Public Key + Domain Name (subject) + Org name ....● List of Trusted
CA certificates
Establish trust ...
Agree on the symmetric encryption key ...
premaster secret
master secret & generate session keys
Use session key and agreed encryption cipher to
send data ...
6. SSL session overview (2 way)
Server
● Server Certificate
● Server Private Key● List of Trusted
CA certificates
Establish trust ...
Agree on the symmetric encryption key ...
master secret & generate session keys
Use session key and agreed encryption cipher to
send data ...
premaster secret
● Client Certificate
● Client Private Key
● List of Trusted
CA certificates
7. ● There are 3 options to obtain an SSL certificate
a. Generate your own self-signed certificate (from https://www.linux.com here)
b. Request certificate from your organisation CA
c. Request certificate from public CA
■ VeriSign
■ GeoTrust
■ ... https://en.wikipedia.org/wiki/Certificate_authority
● In A & B you or your organisation controls hashing and encryption protocols
● However no clients will recognize certificate by default
● In option C you will need to make sure your client versions supports protocols
dictated by external CA
a. Recent example => Many CAs announced that they will not support SHA-1 forcing SHA256/SHA-2
implementation
Certificate Authorities & Certificates
14. 3 Different Oracle Listeners configurations
● Default Listener (insecure)
○ Username/password are encrypted
● Secure Listener
○ Use encryption the same way as SSL Listener
○ No authentication phase (SSL handshake)
● SSL Listener
○ Use encryption
○ Could be configured with 1 way or 2 ways authentication
25. SSL & Oracle Clients setup (OCI)
Using the orapki Utility to Manage PKI Elements
https://docs.oracle.com/database/121/DBSEG/asoappf.htm#DBSEG610
26. $ ls -l /u01/app/oracle/SSL/cert/*
total 16
-rw-r--r--@ 1 yvel 5000 1365 Aug 21 2014 cwallet.sso
-rw-r--r--@ 1 yvel 5000 1288 Aug 21 2014 ewallet.p12
oracle@host:/home/oracle> orapki wallet display -wallet /u01/app/oracle/SSL/cert ; date
Oracle PKI Tool : Version 11.2.0.4.0 - Production
Copyright (c) 2004, 2013, Oracle and/or its affiliates. All rights reserved.
Requested Certificates:
User Certificates:
Subject: CN=PROD
Trusted Certificates:
Subject: OU=Class 1 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Subject: OU=Equifax Secure Certificate Authority,O=Equifax,C=US
Subject: OU=Class 3 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Subject: CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US
Subject: OU=Secure Server Certification Authority,O=RSA Data Security, Inc.,C=US
Subject: OU=Class 2 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Wed Sep 9 16:27:36 PDT 2015
oracle@kpfp2:/home/oracle>
orapki wallet create -wallet $WALLET -auto_login -pwd $v_pwd
orapki wallet remove -wallet $WALLET -trusted_cert_all -pwd $v_pwd
orapki wallet display -wallet $WALLET -pwd $v_pwd
orapki wallet jks_to_pkcs12 -wallet $WALLET -keystore /full/path/to/certificate.jks -jkspwd <pwd>
orapki wallet add -wallet $WALLET -trusted_cert -cert GIAG2.crt -pwd $v_pwd
SSL & Oracle Clients setup (OCI)
27. SSL & Oracle Clients setup (OCI)
$ openssl pkcs12 -info -in /u01/app/oracle/SSL/cert/ewallet.p12
Enter Import Password:
MAC Iteration 1024
MAC verified OK
PKCS7 Encrypted data: pbeWithSHA1And3-KeyTripleDES-CBC, Iteration 1024
Certificate bag
Bag Attributes
localKeyID: E6 B6 52 DD 00 00 00 04 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 04
subject=/C=US/O=MyOrg Inc/CN=MyOrg Internet Authority G2
issuer=/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
-----BEGIN CERTIFICATE-----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...
PKCS 12 => https://en.wikipedia.org/wiki/PKCS_12
It defines an archive file format for storing many cryptography objects as a single file. It is
commonly used to bundle a private key with its X.509 certificate.
28. ● JDBC Clients
○ Have it own default certificate store with preloaded trusted CA list
$ v_java_cert=/Library/Java/JavaVirtualMachines/jdk1.8.0_60.jdk/Contents/Home/jre/lib/security/cacerts
$ keytool -list -keystore $v_java_cert -storepass changeit
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 93 entries
digicertassuredidrootca, Apr 16, 2008, trustedCertEntry,
Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43
comodorsaca, May 12, 2015, trustedCertEntry,
Certificate fingerprint (SHA1): AF:E5:D2:44:A8:D1:19:42:30:FF:47:9F:E2:F8:97:BB:CD:7A:8C:B4
thawtepremiumserverca, May 26, 2015, trustedCertEntry,
Certificate fingerprint (SHA1): E0:AB:05:94:20:72:54:93:05:60:62:02:36:70:F7:CD:2E:FC:66:66
...
$ keytool -exportcert -alias digicertassuredidrootca -keystore $v_java_cert -storepass changeit -
file test.crt -rfc
$ keytool -printcert -file test.crt
Owner: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Serial number: ce7e0e517d846fe8fe560fc1bf03039
Valid from: Thu Nov 09 16:00:00 PST 2006 until: Sun Nov 09 16:00:00 PST 2031
Certificate fingerprints:
MD5: 87:CE:0B:7B:2A:0E:49:00:E1:58:71:9B:37:A8:93:72
SSL & Oracle Clients setup (JBDC)
29. SSL & Oracle Clients setup (JDBC)
● A JRE client must be updated with the JCE to enable
TLS_RSA_WITH_AES_256_CBC_SHA cipher.
○ Download appropriate JCE archive with 2 jar files
○ Copy the jar files to $JAVA_HOME/jre/lib/security/ directory
● The JCE could be obtained from the URL below depending on a JRE version
○ 1.6 JCE
○ 1.7 JCE
○ 1.8 JCE
31. RAC Cluster
Variety of clients and versions to cover ...
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users using tools
directly connecting to
DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener
1. 2.3.
32. Some components used old Oracle Clients
● Essbase
○ Blend in 11.1.0.7 Oracle Client
○ Challenging to update
● OBIEE
○ Presentation layer use 11.1.0.7 Oracle Client
33. SSL Listener & TCP Buffer
Problem definition
Initial:
● DB Instances doesn't register DB Services with a remote SCAN
listeners, after a new certificate has been added to server wallet
Current:
● All SSL connections from one node hangs connecting to any SSL
enabled listeners that runs on a remote node if a listener is able to
send data out quickly enough
34. SSL Listener & TCP Buffer
SSL Listener works if ….
a) strace-ing the listener process
b) turning debug logging up to a high level in the listener
c) Running the listener on a non-bonded interface
d) Having the listener increase its send buffer size from 16k (default)
to 32k or 64k on the socket
d1) We can also do this at the OS level via `echo "4096 32768 4194304" >
/proc/sys/net/ipv4/tcp_wmem'
35. SSL Listener & TCP Buffer
Normal / Expected processing
sPORT:sIP - cIP:cPORT
TCP socketTCP socket buffer
Process
owner of the socket
O_NONBLOCK
W3 W2 W1
DATA
Data writes
O_NONBLOCK
sPORT:sIP - cIP:cPORTProcess
owner of the socket
DATA
Kernel waits a bit for more data and sends it out
Buffer is full. Kernel sends EAGAIN back
5k 1k 3k
3k
W3b
2k
W3bEAGAIN
sPORT:sIP - cIP:cPORTProcess
owner of the socket
The process code handles error and keep sending the rest of the data until successful
3k
W3b
3k
Kernel refuses writes until buffer is free
36. Oracle Listener - fails to process EAGAIN
TCP socketTCP socket buffer
O_NONBLOCK
Data writes
O_NONBLOCK
sPORT:sIP - cIP:cPORTSSL Listener DATA
Buffer is full. Kernel sends EAGAIN back
3k
W3b
2k
W3bEAGAIN
sPORT:sIP - cIP:cPORTSSL Listener
Listener never re-sends the W3b part Kernel ready to process writes after some time
Oracle Listener ssl handshake function fails to process EAGAIN errors
sPORT:sIP - cIP:cPORTSSL Listener DATA
Buffer is full. Kernel sends EAGAIN back
2k
W3b
3k
W3b
The W3b part is dropped
Where is client's
response?
W3b
The W3b part is dropped
SSL Listener & TCP Buffer
38. RAC Cluster
Variety of clients and versions to cover ...
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users using tools
directly connecting to
DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener