Thank you visitors!
- 1,357,960 people have been kind enough to visit our humble blog. Others get our posts by RSS or email or through syndicators. We hope you took away something of value. Please come again!
Top Posts
- What BPM adds to SOA Suite
- Using Multiple Datasources with Spring Boot and Spring Data JPA
- Worklist Overview
- Using JMS in .Net Applications
- New version of JDeveloper released with Maven support and better performance
- Oracle REST Data Services 22.3 brings new REST APIs for Transactional Event Queueing
- Installing Oracle REST Data Services (standalone)
- Let's make a simple MCP tool for Oracle AI Vector Search
- A simple JMS client for WebLogic 11g
- Exploring some new Helidon features - Data Repositories and SE Declarative
-
Copyright 2009-2026 Mark Nelson and other contributors. All Rights Reserved. The views expressed in this blog are our own and do not necessarily reflect the views of Oracle Corporation. All content is provided on an ‘as is’ basis, without warranties or conditions of any kind, either express or implied, including, without limitation, any warranties or conditions of title, non-infringement, merchantability, or fitness for a particular purpose. You are solely responsible for determining the appropriateness of using or redistributing and assume any risks.
Subscribe
Our other publications
Building a Custom BPM Worklist, Oracle InSync 2011 User Group presentation
Performance Tuning for Oracle Business Process Management Suite 10g, Oracle Whitepaper, July 2011
Performance Tuning for Oracle Business Process Management Suite 11g, Oracle Whitepaper, February 2013
Oracle BPM Suite 11g: Advanced BPMN Topics, Packt Publishing, September 2012
Fusion Middleware 12.1.2: Developing Applications with Continuous Integration
Fusion Middleware 12.1.3: Developing Applications with Continuous Integration
Tag Archives: security
Exploring securing vector similarity searches with Real Application Security
In this post, I want to explore how you can use Real Application Security to provide access controls for vectors in a vector store in Oracle Database 23ai. I’m going to use the vector store we created in the last … Continue reading
Posted in Uncategorized
Tagged ai, artificial-intelligence, rag, ras, security, technology
Leave a comment
Allowing limited access to Enterprise Manager
Customers often ask about how to give certain people limited access to Enterprise Manager, often they talk about ‘read only’ access. Enterprise Manager does in fact have three roles defined out-of-the-box that provide various levels of access. You can see … Continue reading

You must be logged in to post a comment.