Do you, perhaps, mean Ridley, as in "Aliens"? IIRC, they left a nuke to
detonate after they took off.
If that's not it, Ripley who?
--
Jack C. Applewhite - Database Administrator
Austin I.S.D. - MIS Department
512.414.9250 (wk)
I cannot help but notice that there is no problem between us that cannot be
solved by your departure. -- Mark Twain
________________________________
From: oracle-l-bounce@xxxxxxxxxxxxx <oracle-l-bounce@xxxxxxxxxxxxx> on behalf
of Rich J <rich242j@xxxxxxxxx>
Sent: Tuesday, August 25, 2020 13:28
To: oracle-l@xxxxxxxxxxxxx <oracle-l@xxxxxxxxxxxxx>
Subject: Re: DBWR config
Hey Ram,
I think whatever any of us say here regarding Kevin's excellent articles,
you'll still need to do the setup and testing yourself, on your hardware, with
your OS, and your version and configuration of Oracle.
It's the only way to be sure. Like taking off and nuking the entire site from
orbit, as Ripley wanted to do...
Rich
On Tue, Aug 25, 2020 at 12:45 PM Ram Raman
<veeeraman@xxxxxxxxx<mailto:veeeraman@xxxxxxxxx>> wrote:
List,
I am considering configuring DBWRs for our new system. I came across this
online:
https://kevinclosson.net/category/dbwr-performance/<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fkevinclosson.net%2fcategory%2fdbwr-performance%2f&c=E,1,t2CXZXbCv_mgJSXVZG9DLcCdRL7KfLVO3htKc8bJRibiIM5OuDz4XeBMt87UibvTZ6p9Rq-FCYLLjjZLD2i2xX0Sj1kbrINM1Pz7QdnB1M6fc0X1&typo=1>
Does the advice hold true today given the blog is a bit dated? We are
planning on hosting a multi TB warehouse on Linux.
Thanks
Ram
--
Confidentiality Notice: This email message, including all attachments, is for
the sole use of the intended recipient(s) and may contain confidential student
and/or employee information. Unauthorized use of disclosure is prohibited under
the federal Family Educational Rights & Privacy Act (20 U.S.C. ?1232g, 34 CFR
Part 99, 19 TAC 247.2, Gov't Code 552.023, Educ. Code 21.355, 29 CFR
1630.14(b)(c)). If you are not the intended recipient, you may not use,
disclose, copy or disseminate this information. Please call the sender
immediately or reply by email and destroy all copies of the original message,
including attachments.