Thank you visitors!
- 1,356,819 people have been kind enough to visit our humble blog. Others get our posts by RSS or email or through syndicators. We hope you took away something of value. Please come again!
Top Posts
- Configuring a WebLogic Data Source to use ATP
- Installing Oracle REST Data Services (standalone)
- Getting started with the new observability exporter for Oracle database
- Running Oracle Autonomous Database in a container
- Increasing swap size on Solaris (using ZFS)
- Getting started with Oracle Vector Store support in LangChain
- Extending Continuous Integration to include MDS-dependent components
- Log rotation for WebLogic Server (and friends)
- Writing a Robot Remote Library
- Custom vector distance functions in Oracle (using JavaScript)
-
Copyright 2009-2025 Mark Nelson and other contributors. All Rights Reserved. The views expressed in this blog are our own and do not necessarily reflect the views of Oracle Corporation. All content is provided on an ‘as is’ basis, without warranties or conditions of any kind, either express or implied, including, without limitation, any warranties or conditions of title, non-infringement, merchantability, or fitness for a particular purpose. You are solely responsible for determining the appropriateness of using or redistributing and assume any risks.
Subscribe
Our other publications
Building a Custom BPM Worklist, Oracle InSync 2011 User Group presentation
Performance Tuning for Oracle Business Process Management Suite 10g, Oracle Whitepaper, July 2011
Performance Tuning for Oracle Business Process Management Suite 11g, Oracle Whitepaper, February 2013
Oracle BPM Suite 11g: Advanced BPMN Topics, Packt Publishing, September 2012
Fusion Middleware 12.1.2: Developing Applications with Continuous Integration
Fusion Middleware 12.1.3: Developing Applications with Continuous Integration
Tag Archives: security
Exploring securing vector similarity searches with Real Application Security
In this post, I want to explore how you can use Real Application Security to provide access controls for vectors in a vector store in Oracle Database 23ai. I’m going to use the vector store we created in the last … Continue reading
Posted in Uncategorized
Tagged ai, artificial-intelligence, rag, ras, security, technology
Leave a comment
Allowing limited access to Enterprise Manager
Customers often ask about how to give certain people limited access to Enterprise Manager, often they talk about ‘read only’ access. Enterprise Manager does in fact have three roles defined out-of-the-box that provide various levels of access. You can see … Continue reading

You must be logged in to post a comment.